Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 16 of 36
Previous Record Next Record
E-Book/E-Doc

Title The best damn IT security management book period / Bryan Cunningham [and others].

Imprint Burlington, Mass. : Syngress, ©2007.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (1 volume)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file
Contents pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists.
Summary The "Swiss Army knife" for security professionals!
Note Print version record.
Language English.
Subject Computer security -- Management.
Sécurité informatique -- Gestion.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer security -- Management
Added Author Susan Snedaker. Author.
Cunningham, Bryan, JD. Author.
Other Form: Print version: Cunningham, Bryan, JD. Best damn IT security management book period. Burlington, MA : Syngress, ©2007 9781597492270 1597492272 (OCoLC)183149789
ISBN 9780080557335 (electronic bk.)
0080557333 (electronic bk.)
9781597492270
1597492272 (Paper)
1281145173
9781281145178
9786611145170
6611145176
Standard No. AU@ 000043178436
AU@ 000051560714
AU@ 000053250631
AU@ 000060584735
CHBIS 006041578
CHNEW 001007640
CHVBK 199618968
DEBBG BV042305721
DEBBG BV043068187
DEBSZ 355443678
DEBSZ 405318952
DEBSZ 422153222
GBVCP 802621813
HEBIS 291513972
NZ1 12541579
NZ1 15189664

 
    
Available items only