Cargando…

Network security evaluation : using the NSA IEM /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Fuller, Ed
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress Pub., ©2005.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Contents; Prologue Why the IEM?; Chapter 1 Introducing the INFOSEC Evaluation Methodology; Chapter 2 Before the Evaluation Starts; Chapter 3 Setting Expectations; Chapter 4 Scoping the Evaluation; Chapter 5 Legal Principles for Information Security Evaluations1; Chapter 6 Building the Technical Evaluation Plan; Chapter 7 Starting Your On-Site Efforts; Chapter 8 Network Discovery Activities; Chapter 9 Collecting the Majority of Vulnerabilities; Chapter 10 Fine-Tuning the Evaluation; Chapter 11 The Onsite Closing Meeting; Chapter 12 Post-Evaluation Analysis
  • Chapter 13 Creating Measurements and Trending ResultsChapter 14 Trending Metrics; Chapter 15 Final Reporting; Chapter 16 Summing Up; Appendix A Examples of INFOSEC Tools by Baseline Activity; Technical Evaluation Plan Outline and Sample; Index; Related Titles