The best damn IT security management book period /
The "Swiss Army knife" for security professionals!
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, Mass. :
Syngress,
©2007.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocn236383873 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 080609s2007 maua o 001 0 eng d | ||
010 | |z 2008295095 | ||
040 | |a CtWfDGI |b eng |e pn |c COCUF |d N$T |d YDXCP |d MERUC |d UBY |d UMI |d CEF |d E7B |d OCLCQ |d NHM |d IDEBK |d OCLCQ |d B24X7 |d DEBSZ |d OCLCQ |d OCLCO |d VLB |d OCLCQ |d OCLCF |d OCLCO |d OPELS |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d LIV |d OCLCQ |d JBG |d OCLCA |d D6H |d VTS |d ZZAND |d AU@ |d STF |d M8D |d VT2 |d OCLCO |d OCLCQ |d QGK |d OCLCO | ||
015 | |a GBA7A0421 |2 bnb | ||
016 | 7 | |a 014465042 |2 Uk | |
019 | |a 191703042 |a 228148556 |a 402442075 |a 441819217 |a 505059012 |a 648331449 |a 916415038 |a 1044299856 |a 1056438091 |a 1057970747 |a 1153049876 |a 1259087647 | ||
020 | |a 9780080557335 |q (electronic bk.) | ||
020 | |a 0080557333 |q (electronic bk.) | ||
020 | |z 9781597492270 | ||
020 | |z 1597492272 |q (Paper) | ||
020 | |a 1281145173 | ||
020 | |a 9781281145178 | ||
020 | |a 9786611145170 | ||
020 | |a 6611145176 | ||
029 | 1 | |a AU@ |b 000043178436 | |
029 | 1 | |a AU@ |b 000051560714 | |
029 | 1 | |a AU@ |b 000053250631 | |
029 | 1 | |a AU@ |b 000060584735 | |
029 | 1 | |a CHBIS |b 006041578 | |
029 | 1 | |a CHNEW |b 001007640 | |
029 | 1 | |a CHVBK |b 199618968 | |
029 | 1 | |a DEBBG |b BV042305721 | |
029 | 1 | |a DEBBG |b BV043068187 | |
029 | 1 | |a DEBSZ |b 355443678 | |
029 | 1 | |a DEBSZ |b 405318952 | |
029 | 1 | |a DEBSZ |b 422153222 | |
029 | 1 | |a GBVCP |b 802621813 | |
029 | 1 | |a HEBIS |b 291513972 | |
029 | 1 | |a NZ1 |b 12541579 | |
029 | 1 | |a NZ1 |b 15189664 | |
035 | |a (OCoLC)236383873 |z (OCoLC)191703042 |z (OCoLC)228148556 |z (OCoLC)402442075 |z (OCoLC)441819217 |z (OCoLC)505059012 |z (OCoLC)648331449 |z (OCoLC)916415038 |z (OCoLC)1044299856 |z (OCoLC)1056438091 |z (OCoLC)1057970747 |z (OCoLC)1153049876 |z (OCoLC)1259087647 | ||
037 | |a CL0500000043 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 |b B486 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
245 | 0 | 4 | |a The best damn IT security management book period / |c Bryan Cunningham [and others]. |
260 | |a Burlington, Mass. : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (1 volume) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
505 | 0 | |a pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. | |
520 | |a The "Swiss Army knife" for security professionals! | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security |x Management. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Management |2 fast | |
700 | 1 | |a Susan Snedaker. |4 aut | |
700 | 1 | |a Cunningham, Bryan, |c JD. |4 aut | |
776 | 0 | 8 | |i Print version: |a Cunningham, Bryan, JD. |t Best damn IT security management book period. |d Burlington, MA : Syngress, ©2007 |z 9781597492270 |z 1597492272 |w (OCoLC)183149789 |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216952 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597492270/?ar |z Texto completo |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00025442 | ||
938 | |a EBSCOhost |b EBSC |n 216952 | ||
938 | |a YBP Library Services |b YANK |n 2766990 | ||
994 | |a 92 |b IZTAP |