Cargando…

Network security auditing /

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, includin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jackson, Chris, 1973-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Cisco Press, ©2010.
Colección:Cisco Press networking technology series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn656358979
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 100604s2010 inua ob 001 0 eng d
010 |a  2010020583 
040 |a CDX  |b eng  |e pn  |c CDX  |d OCLCQ  |d UMI  |d IDEBK  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d YDX  |d OCLCQ  |d WYU  |d UAB  |d VT2  |d CNCEN  |d ERF  |d UHL  |d UKBTH  |d OCLCF  |d OCLCO  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCO 
015 |a GBB037477  |2 bnb 
016 7 |a 015505784  |2 Uk 
019 |a 608314001  |a 667102357  |a 1062923839  |a 1103282381  |a 1112592446  |a 1112963642  |a 1113797636  |a 1129355568  |a 1202543129  |a 1240508776  |a 1392376834 
020 |a 9781587053528  |q (pbk.) 
020 |a 1587053527  |q (pbk.) 
020 |a 9781587059407 
020 |a 1587059401 
024 8 |a 9786612585807 
024 8 |a 9781587059407 
029 1 |a DEBSZ  |b 355440687 
029 1 |a HEBIS  |b 291511112 
029 1 |a NZ1  |b 13685887 
029 1 |a AU@  |b 000067113050 
035 |a (OCoLC)656358979  |z (OCoLC)608314001  |z (OCoLC)667102357  |z (OCoLC)1062923839  |z (OCoLC)1103282381  |z (OCoLC)1112592446  |z (OCoLC)1112963642  |z (OCoLC)1113797636  |z (OCoLC)1129355568  |z (OCoLC)1202543129  |z (OCoLC)1240508776  |z (OCoLC)1392376834 
037 |a 258580  |b MIL 
050 4 |a TK5105.59  |b .J325 2010eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Jackson, Chris,  |d 1973- 
245 1 0 |a Network security auditing /  |c Chris Jackson. 
260 |a Indianapolis, IN :  |b Cisco Press,  |c ©2010. 
300 |a 1 online resource (xxiv, 488 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Cisco Press networking technology series 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach. Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products. This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company's security posture. Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery. Recognize the foundational roles of security policies, procedures, and standards. Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting. Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors. Evaluate people, processes, and technical security controls through a system-based approach. Audit security services enabled through Cisco products. Analyze security policy and compliance requirements for Cisco networks. Assess infrastructure security and intrusion prevention systems. Audit network access control and secure remote access systems. Review security in clients, hosts, and IP communications. Evaluate the performance of security monitoring and management systems. This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks. 
542 |f Copyright © 2010 Cisco Systems, Inc.  |g 2010 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |x Evaluation. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Évaluation. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 9786612585807 
830 0 |a Cisco Press networking technology series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781587059407/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41057344 
938 |a YBP Library Services  |b YANK  |n 18082369 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38082474 
938 |a Coutts Information Services  |b COUT  |n 13553381 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 258580 
938 |a YBP Library Services  |b YANK  |n 14851810 
938 |a Internet Archive  |b INAR  |n networksecuritya0000jack 
994 |a 92  |b IZTAP