Cargando…

The best damn IT security management book period /

The "Swiss Army knife" for security professionals!

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Susan Snedaker (Autor), Cunningham, Bryan, JD (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress, ©2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • pt. 1. From Vulnerability to Patch
  • Ch. 1. Windows of Vulnerability
  • Ch. 2. Vulnerability Assessment 101
  • Ch. 3. Vulnerability Assessment Tools
  • Ch. 4. Vulnerability Assessment: Step One
  • Ch. 5. Vulnerability Assessment: Step Two
  • Ch. 6. Going Further
  • Ch. 7. Vulnerability Management
  • Ch. 8. Vulnerability Management Tools
  • Ch. 9. Vulnerability and Configuration Management
  • Ch. 10. Regulatory Compliance
  • Ch. 11. Tying It All Together
  • pt. 2. Network Security Evaluation
  • Ch. 12. Introducing the INFOSEC Evaluation Methodology
  • Ch. 13. Before the Evaluation Starts
  • Ch. 14. Setting Expectations
  • Ch. 15. Scoping the Evaluation
  • Ch. 16. Legal Principles for Information Security Evaluations
  • Ch. 17. Building the Technical Evaluation Plan
  • Ch. 18. Starting Your Onsite Efforts
  • Ch. 19. Network Discovery Activities
  • Ch. 20. Collecting the Majority of Vulnerabilities
  • Ch. 21. Fine-Tuning the Evaluation
  • Ch. 22. The Onsite Closing Meeting
  • Ch. 23. Post-Evaluation Analysis
  • Ch. 24. Creating Measurements and Trending Results
  • Ch. 25. Trending Metrics
  • Ch. 26. Final Reporting
  • Ch. 27. Summing Up the INFOSEC Evaluation Methodology
  • pt. 3. Business Continuity & Disaster Recovery
  • Ch. 28. Business Continuity and Disaster Recovery Overview
  • Ch. 29. Project Initiation
  • Ch. 30. Risk Assessment
  • Ch. 31. Business Impact Analysis
  • Ch. 32. Mitigation Strategy Development
  • Ch. 33. Business Continuity/Disaster Recovery Plan Development
  • Ch. 34. Emergency Response and Recovery
  • Ch. 35. Training, Testing, and Auditing
  • Ch. 36. BC/DR Plan Maintenance
  • Ch. 37. BC/DR Checklists.