|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn236383873 |
003 |
OCoLC |
005 |
20231117015114.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
080609s2007 maua o 001 0 eng d |
010 |
|
|
|z 2008295095
|
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c COCUF
|d N$T
|d YDXCP
|d MERUC
|d UBY
|d UMI
|d CEF
|d E7B
|d OCLCQ
|d NHM
|d IDEBK
|d OCLCQ
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCO
|d VLB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OPELS
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d AGLDB
|d LIV
|d OCLCQ
|d JBG
|d OCLCA
|d D6H
|d VTS
|d ZZAND
|d AU@
|d STF
|d M8D
|d VT2
|d OCLCO
|d OCLCQ
|d QGK
|d OCLCO
|
015 |
|
|
|a GBA7A0421
|2 bnb
|
016 |
7 |
|
|a 014465042
|2 Uk
|
019 |
|
|
|a 191703042
|a 228148556
|a 402442075
|a 441819217
|a 505059012
|a 648331449
|a 916415038
|a 1044299856
|a 1056438091
|a 1057970747
|a 1153049876
|a 1259087647
|
020 |
|
|
|a 9780080557335
|q (electronic bk.)
|
020 |
|
|
|a 0080557333
|q (electronic bk.)
|
020 |
|
|
|z 9781597492270
|
020 |
|
|
|z 1597492272
|q (Paper)
|
020 |
|
|
|a 1281145173
|
020 |
|
|
|a 9781281145178
|
020 |
|
|
|a 9786611145170
|
020 |
|
|
|a 6611145176
|
035 |
|
|
|a (OCoLC)236383873
|z (OCoLC)191703042
|z (OCoLC)228148556
|z (OCoLC)402442075
|z (OCoLC)441819217
|z (OCoLC)505059012
|z (OCoLC)648331449
|z (OCoLC)916415038
|z (OCoLC)1044299856
|z (OCoLC)1056438091
|z (OCoLC)1057970747
|z (OCoLC)1153049876
|z (OCoLC)1259087647
|
050 |
|
4 |
|a QA76.9.A25
|b B486 2007eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
4 |
|a The best damn IT security management book period /
|c Bryan Cunningham [and others].
|
260 |
|
|
|a Burlington, Mass. :
|b Syngress,
|c �2007.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
505 |
0 |
|
|a pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists.
|
520 |
|
|
|a The "Swiss Army knife" for security professionals!
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
6 |
|a S�ecurit�e informatique
|0 (CaQQLa)201-0061152
|x Gestion.
|0 (CaQQLa)201-0380063
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|0 (OCoLC)fst00872493
|
700 |
1 |
|
|a Susan Snedaker.
|4 aut
|
700 |
1 |
|
|a Cunningham, Bryan,
|c JD.
|4 aut
|
776 |
0 |
8 |
|i Print version:
|a Cunningham, Bryan, JD.
|t Best damn IT security management book period.
|d Burlington, MA : Syngress, �2007
|z 9781597492270
|z 1597492272
|w (OCoLC)183149789
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597492270
|z Texto completo
|