|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn935264269 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
160116s2003 vtu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MERUC
|d ZCU
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9780080530185
|
020 |
|
|
|a 0080530184
|
029 |
1 |
|
|a DEBBG
|b BV044127004
|
035 |
|
|
|a (OCoLC)935264269
|
050 |
|
4 |
|a QA76.9.A25 ǂb H35 2003eb
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rittinghouse, PhD, CISM, John.
|
245 |
1 |
0 |
|a Cybersecurity Operations Handbook :
|b the definitive reference on operational cybersecurity.
|
260 |
|
|
|a Burlington :
|b Elsevier Science,
|c 2003.
|
300 |
|
|
|a 1 online resource (1331 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary.
|
505 |
8 |
|
|a 1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control.
|
505 |
8 |
|
|a 3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security ; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes.
|
505 |
8 |
|
|a Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study.
|
505 |
8 |
|
|a 5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques.
|
500 |
|
|
|a 7.10 Steganography.
|
520 |
|
|
|a Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete cove.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Hancock, PhD, CISSP, CISM, William M.
|
758 |
|
|
|i has work:
|a Cybersecurity operations handbook (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFvY36h374VdGQ3VDJ447b
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Rittinghouse, PhD, CISM, John.
|t Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity.
|d Burlington : Elsevier Science, ©2003
|z 9781555583064
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=313612
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL313612
|
994 |
|
|
|a 92
|b IZTAP
|