Network security evaluation : using the NSA IEM /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress Pub.,
©2005.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Contents; Prologue Why the IEM?; Chapter 1 Introducing the INFOSEC Evaluation Methodology; Chapter 2 Before the Evaluation Starts; Chapter 3 Setting Expectations; Chapter 4 Scoping the Evaluation; Chapter 5 Legal Principles for Information Security Evaluations1; Chapter 6 Building the Technical Evaluation Plan; Chapter 7 Starting Your On-Site Efforts; Chapter 8 Network Discovery Activities; Chapter 9 Collecting the Majority of Vulnerabilities; Chapter 10 Fine-Tuning the Evaluation; Chapter 11 The Onsite Closing Meeting; Chapter 12 Post-Evaluation Analysis
- Chapter 13 Creating Measurements and Trending ResultsChapter 14 Trending Metrics; Chapter 15 Final Reporting; Chapter 16 Summing Up; Appendix A Examples of INFOSEC Tools by Baseline Activity; Technical Evaluation Plan Outline and Sample; Index; Related Titles