The best damn IT security management book period /
The "Swiss Army knife" for security professionals!
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, Mass. :
Syngress,
©2007.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. 1. From Vulnerability to Patch
- Ch. 1. Windows of Vulnerability
- Ch. 2. Vulnerability Assessment 101
- Ch. 3. Vulnerability Assessment Tools
- Ch. 4. Vulnerability Assessment: Step One
- Ch. 5. Vulnerability Assessment: Step Two
- Ch. 6. Going Further
- Ch. 7. Vulnerability Management
- Ch. 8. Vulnerability Management Tools
- Ch. 9. Vulnerability and Configuration Management
- Ch. 10. Regulatory Compliance
- Ch. 11. Tying It All Together
- pt. 2. Network Security Evaluation
- Ch. 12. Introducing the INFOSEC Evaluation Methodology
- Ch. 13. Before the Evaluation Starts
- Ch. 14. Setting Expectations
- Ch. 15. Scoping the Evaluation
- Ch. 16. Legal Principles for Information Security Evaluations
- Ch. 17. Building the Technical Evaluation Plan
- Ch. 18. Starting Your Onsite Efforts
- Ch. 19. Network Discovery Activities
- Ch. 20. Collecting the Majority of Vulnerabilities
- Ch. 21. Fine-Tuning the Evaluation
- Ch. 22. The Onsite Closing Meeting
- Ch. 23. Post-Evaluation Analysis
- Ch. 24. Creating Measurements and Trending Results
- Ch. 25. Trending Metrics
- Ch. 26. Final Reporting
- Ch. 27. Summing Up the INFOSEC Evaluation Methodology
- pt. 3. Business Continuity & Disaster Recovery
- Ch. 28. Business Continuity and Disaster Recovery Overview
- Ch. 29. Project Initiation
- Ch. 30. Risk Assessment
- Ch. 31. Business Impact Analysis
- Ch. 32. Mitigation Strategy Development
- Ch. 33. Business Continuity/Disaster Recovery Plan Development
- Ch. 34. Emergency Response and Recovery
- Ch. 35. Training, Testing, and Auditing
- Ch. 36. BC/DR Plan Maintenance
- Ch. 37. BC/DR Checklists.