|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn228148066 |
003 |
OCoLC |
005 |
20231117015106.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
080516s2007 maua ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OCLCQ
|d N$T
|d IDEBK
|d E7B
|d DKDLA
|d OCLCQ
|d OCLCF
|d UMI
|d DEBBG
|d DEBSZ
|d YDXCP
|d OCLCQ
|d COO
|d AGLDB
|d OCLCA
|d D6H
|d OCLCQ
|d VTS
|d CEF
|d WYU
|d JBG
|d STF
|d LEAUB
|d M8D
|d OCLCQ
|d K6U
|d VT2
|d VLY
|d OCLCQ
|d OCLCO
|d DST
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 243694635
|a 473205316
|a 646747337
|a 871683730
|a 1065943741
|a 1156359495
|a 1162002508
|a 1241950065
|a 1300530800
|
020 |
|
|
|a 9781597491228
|
020 |
|
|
|a 1597491225
|
020 |
|
|
|a 9780080558783
|q (electronic bk.)
|
020 |
|
|
|a 008055878X
|q (electronic bk.)
|
020 |
|
|
|a 1281325473
|
020 |
|
|
|a 9781281325471
|
020 |
|
|
|a 9786611325473
|
020 |
|
|
|a 6611325476
|
024 |
1 |
|
|z 792502912256
|
035 |
|
|
|a (OCoLC)228148066
|z (OCoLC)243694635
|z (OCoLC)473205316
|z (OCoLC)646747337
|z (OCoLC)871683730
|z (OCoLC)1065943741
|z (OCoLC)1156359495
|z (OCoLC)1162002508
|z (OCoLC)1241950065
|z (OCoLC)1300530800
|
050 |
|
4 |
|a QA76.9.A25
|b P49 2007eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.478
|b P578
|2 22
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Physical and logical security convergence powered by enterprise security management /
|c Brian T. Contos [and others] ; foreword by Regis McKenna.
|
260 |
|
|
|a Burlington, MA :
|b Syngress Pub.,
|c �2007.
|
300 |
|
|
|a 1 online resource (xxvi, 566 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
|
505 |
0 |
|
|a 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Information technology.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a Technologie de l'information.
|0 (CaQQLa)201-0023285
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
7 |
|a information technology.
|2 aat
|0 (CStmoGRI)aat300128218
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information technology.
|2 fast
|0 (OCoLC)fst00973089
|
700 |
1 |
|
|a Contos, Brian T.
|
776 |
0 |
8 |
|i Print version:
|t Physical and logical security convergence powered by enterprise security management.
|d Burlington, MA : Syngress Pub., �2007
|z 9781597491228
|z 1597491225
|w (DLC) 2007296815
|w (OCoLC)123894828
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597491228
|z Texto completo
|