Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 16 of 79
Previous Record Next Record
Electronic Book

Title The best damn IT security management book period / Bryan Cunningham [and others].

Imprint Burlington, Mass. : Syngress, ©2007.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (1 volume)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file
Contents pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists.
Summary The "Swiss Army knife" for security professionals!
Note Print version record.
Language English.
Subject Computer security -- Management.
Sécurité informatique -- Gestion.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer security -- Management
Added Author Susan Snedaker. Author.
Cunningham, Bryan, JD. Author.
Other Form: Print version: Cunningham, Bryan, JD. Best damn IT security management book period. Burlington, MA : Syngress, ©2007 9781597492270 1597492272 (OCoLC)183149789
ISBN 9780080557335 (electronic bk.)
0080557333 (electronic bk.)
9781597492270
1597492272 (Paper)
1281145173
9781281145178
9786611145170
6611145176
Standard No. AU@ 000043178436
AU@ 000051560714
AU@ 000053250631
AU@ 000060584735
CHBIS 006041578
CHNEW 001007640
CHVBK 199618968
DEBBG BV042305721
DEBBG BV043068187
DEBSZ 355443678
DEBSZ 405318952
DEBSZ 422153222
GBVCP 802621813
HEBIS 291513972
NZ1 12541579
NZ1 15189664

 
    
Available items only