Surviving Security: How to Integrate People, Process, and TechnologyCRC Press, 2003. gada 18. dec. - 528 lappuses Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that conside |
No grāmatas satura
1.–5. rezultāts no 80.
. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
. lappuse
... ......................................................................... 21. 2. Understanding Requirements and Risk .............................25 What Is Risk?.................................................................
... ......................................................................... 21. 2. Understanding Requirements and Risk .............................25 What Is Risk?.................................................................
. lappuse
... Introducing Anson Inc. .............................................................................. 31 Assessing Risk.................................................................................................. 32 ...
... Introducing Anson Inc. .............................................................................. 31 Assessing Risk.................................................................................................. 32 ...
1. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
5. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Why Do I Need Security? | 1 |
Understanding Requirements and Risk | 25 |
Security Policies and Procedures | 47 |
Cryptography and Encryption | 69 |
Authentication | 95 |
Network Architecture and Physical Security | 115 |
Firewalls and Perimeter Security | 137 |
Network Management and Device Security | 163 |
Server Security | 263 |
Client Security | 299 |
Application Development | 321 |
Security Maintenance and Monitoring | 341 |
Vulnerability Testing | 359 |
Security Audits | 373 |
Incident Response | 413 |
Integrating People Process and Technology | 453 |
Wireless Network Security | 181 |
Intrusion Detection | 195 |
Remote Access | 219 |
Host Security | 241 |
Trends to Watch | 471 |
Reference List | 481 |
483 | |
Citi izdevumi - Skatīt visu
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Ierobežota priekšskatīšana - 2003 |
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Ierobežota priekšskatīšana - 2003 |
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Ierobežota priekšskatīšana - 2003 |
Bieži izmantoti vārdi un frāzes
activity administrators allow analysis application approach assessment attacks audit authentication authorization certificate changes Chapter client communications complete compromised configuration connection corporate cost create database detection developed devices discussed e-mail easily employees enable encryption ensure environment example Exhibit exist firewall functionality gain host identify implement important incident installed internal Internet issues Linux look Microsoft monitoring operating system organization packet password patches perform person physical port prevent problems procedures protect Protocol remote access request require response risk router running scripts security infrastructure security policy sendmail server solution specific standard step threat traffic vendors vulnerabilities Windows wireless