Cargando…

Physical and logical security convergence powered by enterprise security management /

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two di...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Contos, Brian T.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., ©2007.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn228148066
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 080516s2007 maua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d N$T  |d IDEBK  |d E7B  |d DKDLA  |d OCLCQ  |d OCLCF  |d UMI  |d DEBBG  |d DEBSZ  |d YDXCP  |d OCLCQ  |d COO  |d AGLDB  |d OCLCA  |d D6H  |d OCLCQ  |d VTS  |d CEF  |d WYU  |d JBG  |d STF  |d LEAUB  |d M8D  |d OCLCQ  |d K6U  |d VT2  |d VLY  |d OCLCQ  |d OCLCO  |d DST  |d OCLCO  |d OCLCQ 
019 |a 243694635  |a 473205316  |a 646747337  |a 871683730  |a 1065943741  |a 1156359495  |a 1162002508  |a 1241950065  |a 1300530800 
020 |a 9781597491228 
020 |a 1597491225 
020 |a 9780080558783  |q (electronic bk.) 
020 |a 008055878X  |q (electronic bk.) 
020 |a 1281325473 
020 |a 9781281325471 
020 |a 9786611325473 
020 |a 6611325476 
024 1 |z 792502912256 
029 1 |a AU@  |b 000043178432 
029 1 |a AU@  |b 000051554856 
029 1 |a AU@  |b 000060058153 
029 1 |a CHBIS  |b 006041561 
029 1 |a CHNEW  |b 001007521 
029 1 |a CHVBK  |b 199629099 
029 1 |a DEBBG  |b BV042031512 
029 1 |a DEBBG  |b BV042305686 
029 1 |a DEBBG  |b BV043045198 
029 1 |a DEBSZ  |b 405318111 
029 1 |a DEBSZ  |b 414169654 
029 1 |a DEBSZ  |b 422116432 
029 1 |a NZ1  |b 12541567 
029 1 |a NZ1  |b 15189632 
035 |a (OCoLC)228148066  |z (OCoLC)243694635  |z (OCoLC)473205316  |z (OCoLC)646747337  |z (OCoLC)871683730  |z (OCoLC)1065943741  |z (OCoLC)1156359495  |z (OCoLC)1162002508  |z (OCoLC)1241950065  |z (OCoLC)1300530800 
037 |a 136665:136799  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b P49 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 658.478  |b P578  |2 22 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Physical and logical security convergence powered by enterprise security management /  |c Brian T. Contos [and others] ; foreword by Regis McKenna. 
260 |a Burlington, MA :  |b Syngress Pub.,  |c ©2007. 
300 |a 1 online resource (xxvi, 566 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide. 
505 0 |a 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts. 
500 |a Includes index. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information technology. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Technologie de l'information. 
650 6 |a Sécurité informatique. 
650 7 |a information technology.  |2 aat 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Information technology.  |2 fast  |0 (OCoLC)fst00973089 
700 1 |a Contos, Brian T. 
776 0 8 |i Print version:  |t Physical and logical security convergence powered by enterprise security management.  |d Burlington, MA : Syngress Pub., ©2007  |z 9781597491228  |z 1597491225  |w (DLC) 2007296815  |w (OCoLC)123894828 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=230832  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10229412 
938 |a EBSCOhost  |b EBSC  |n 230832 
938 |a YBP Library Services  |b YANK  |n 2820998 
994 |a 92  |b IZTAP