Cargando…

The best damn IT security management book period /

The "Swiss Army knife" for security professionals!

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Susan Snedaker (Autor), Cunningham, Bryan, JD (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress, ©2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn236383873
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 080609s2007 maua o 001 0 eng d
010 |z  2008295095 
040 |a CtWfDGI  |b eng  |e pn  |c COCUF  |d N$T  |d YDXCP  |d MERUC  |d UBY  |d UMI  |d CEF  |d E7B  |d OCLCQ  |d NHM  |d IDEBK  |d OCLCQ  |d B24X7  |d DEBSZ  |d OCLCQ  |d OCLCO  |d VLB  |d OCLCQ  |d OCLCF  |d OCLCO  |d OPELS  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d LIV  |d OCLCQ  |d JBG  |d OCLCA  |d D6H  |d VTS  |d ZZAND  |d AU@  |d STF  |d M8D  |d VT2  |d OCLCO  |d OCLCQ  |d QGK  |d OCLCO 
015 |a GBA7A0421  |2 bnb 
016 7 |a 014465042  |2 Uk 
019 |a 191703042  |a 228148556  |a 402442075  |a 441819217  |a 505059012  |a 648331449  |a 916415038  |a 1044299856  |a 1056438091  |a 1057970747  |a 1153049876  |a 1259087647 
020 |a 9780080557335  |q (electronic bk.) 
020 |a 0080557333  |q (electronic bk.) 
020 |z 9781597492270 
020 |z 1597492272  |q (Paper) 
020 |a 1281145173 
020 |a 9781281145178 
020 |a 9786611145170 
020 |a 6611145176 
029 1 |a AU@  |b 000043178436 
029 1 |a AU@  |b 000051560714 
029 1 |a AU@  |b 000053250631 
029 1 |a AU@  |b 000060584735 
029 1 |a CHBIS  |b 006041578 
029 1 |a CHNEW  |b 001007640 
029 1 |a CHVBK  |b 199618968 
029 1 |a DEBBG  |b BV042305721 
029 1 |a DEBBG  |b BV043068187 
029 1 |a DEBSZ  |b 355443678 
029 1 |a DEBSZ  |b 405318952 
029 1 |a DEBSZ  |b 422153222 
029 1 |a GBVCP  |b 802621813 
029 1 |a HEBIS  |b 291513972 
029 1 |a NZ1  |b 12541579 
029 1 |a NZ1  |b 15189664 
035 |a (OCoLC)236383873  |z (OCoLC)191703042  |z (OCoLC)228148556  |z (OCoLC)402442075  |z (OCoLC)441819217  |z (OCoLC)505059012  |z (OCoLC)648331449  |z (OCoLC)916415038  |z (OCoLC)1044299856  |z (OCoLC)1056438091  |z (OCoLC)1057970747  |z (OCoLC)1153049876  |z (OCoLC)1259087647 
037 |a CL0500000043  |b Safari Books Online 
050 4 |a QA76.9.A25  |b B486 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 4 |a The best damn IT security management book period /  |c Bryan Cunningham [and others]. 
260 |a Burlington, Mass. :  |b Syngress,  |c ©2007. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
505 0 |a pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. 
520 |a The "Swiss Army knife" for security professionals! 
588 0 |a Print version record. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Management. 
650 6 |a Sécurité informatique  |x Gestion. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
700 1 |a Susan Snedaker.  |4 aut 
700 1 |a Cunningham, Bryan,  |c JD.  |4 aut 
776 0 8 |i Print version:  |a Cunningham, Bryan, JD.  |t Best damn IT security management book period.  |d Burlington, MA : Syngress, ©2007  |z 9781597492270  |z 1597492272  |w (OCoLC)183149789 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597492270/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a Books 24x7  |b B247  |n bks00025442 
938 |a EBSCOhost  |b EBSC  |n 216952 
938 |a YBP Library Services  |b YANK  |n 2766990 
994 |a 92  |b IZTAP