Description |
1 online resource (1 volume) |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
|
text file |
Contents |
pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. |
Summary |
The "Swiss Army knife" for security professionals! |
Note |
Print version record. |
Language |
English. |
Subject |
Computer security -- Management.
|
|
Sécurité informatique -- Gestion.
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer security -- Management
|
Added Author |
Susan Snedaker. Author.
|
|
Cunningham, Bryan, JD. Author.
|
Other Form: |
Print version: Cunningham, Bryan, JD. Best damn IT security management book period. Burlington, MA : Syngress, ©2007 9781597492270 1597492272 (OCoLC)183149789 |
ISBN |
9780080557335 (electronic bk.) |
|
0080557333 (electronic bk.) |
|
9781597492270 |
|
1597492272 (Paper) |
|
1281145173 |
|
9781281145178 |
|
9786611145170 |
|
6611145176 |
Standard No. |
AU@ 000043178436 |
|
AU@ 000051560714 |
|
AU@ 000053250631 |
|
AU@ 000060584735 |
|
CHBIS 006041578 |
|
CHNEW 001007640 |
|
CHVBK 199618968 |
|
DEBBG BV042305721 |
|
DEBBG BV043068187 |
|
DEBSZ 355443678 |
|
DEBSZ 405318952 |
|
DEBSZ 422153222 |
|
GBVCP 802621813 |
|
HEBIS 291513972 |
|
NZ1 12541579 |
|
NZ1 15189664 |
|