Managing information security /

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerabilit...

Full description

Saved in:
Bibliographic Details
Other Authors: Vacca, John R.
Format: Electronic eBook
Language:English
Published: Amsterdam ; Waltham, MA : Syngress, 2014.
Edition:2nd ed.
Subjects:
Online Access:CONNECT
CONNECT

MARC

LEADER 00000cam a2200000Ma 4500
001 in00005978711
006 m o d
007 cr |n|||||||||
008 130830s2014 ne o 000 0 eng d
005 20240708165552.2
020 |a 1299808344  |q (electronic bk.) 
020 |a 9781299808348  |q (electronic bk.) 
020 |z 9780124166882 
020 |z 0124166881 
035 |a 1WRLDSHRocn857278502 
035 |a (OCoLC)857278502 
037 |a 512085  |b MIL 
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d OPELS  |d CDX  |d OCLCQ  |d OCLCO  |d OCLCF  |d UIU  |d OCLCQ  |d Z5A  |d OCLCQ  |d OCLCA  |d U3W  |d D6H  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d TMA  |d OCLCQ  |d SXB  |d OCLCQ 
049 |a TXMM 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Managing information security /  |c edited by John R. Vacca. 
250 |a 2nd ed. 
260 |a Amsterdam ;  |a Waltham, MA :  |b Syngress,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions. 
588 0 |a Print version record. 
505 0 0 |g 1.  |t Information Security Essentials for IT Managers /  |r Albert Caballero --  |g 1.  |t Information Security Essentials for IT Managers, Overview --  |g 2.  |t Protecting Mission-Critical Systems --  |g 3.  |t Information Security from the Ground Up --  |g 4.  |t Security Monitoring and Effectiveness --  |g 5.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 2.  |t Security Management Systems /  |r James T. Harmening --  |g 1.  |t Security Management System Standards --  |g 2.  |t Training Requirements --  |g 3.  |t Principles of Information Security --  |g 4.  |t Roles and Responsibilities of Personnel --  |g 5.  |t Security Policies --  |g 6.  |t Security Controls --  |g 7.  |t Network Access --  |g 8.  |t Risk Assessment --  |g 9.  |t Incident Response --  |g 10.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 3.  |t Information Technology Security Management /  |r Bhushan Kapoor --  |g 1.  |t Information Security Management Standards --  |g 2.  |t Other Organizations Involved in Standards --  |g 3.  |t Information Technology Security Aspects --  |g 4.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 4.  |t Online Identity and User Management Services /  |r Jean-Marc Seigneur --  |g 1.  |t Introduction --  |g 2.  |t Evolution of Identity Management Requirements --  |g 3.  |t The Requirements Fulfilled by Identity Management Technologies --  |g 4.  |t Identity Management 1.0 --  |g 5.  |t Social Login and User Management --  |g 6.  |t Identity 2.0 for Mobile Users --  |g 7.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t References --  |g 5.  |t Intrusion Prevention and Detection Systems /  |r Christopher Day --  |g 1.  |t What is an `Intrusion' Anyway? --  |g 2.  |t Physical Theft --  |g 3.  |t Abuse of Privileges (The Insider Threat) --  |g 4.  |t Unauthorized Access by Outsider --  |g 5.  |t Malware Infection --  |g 6.  |t The Role of the `0-Day' --  |g 7.  |t The Rogue's Gallery: Attackers and Motives --  |g 8.  |t A Brief Introduction to TCP/IP --  |g 9.  |t The TCP/IP Data Architecture and Data Encapsulation --  |g 10.  |t Survey of Intrusion Detection and Prevention Technologies --  |g 11.  |t Anti-Malware Software --  |g 12.  |t Network-Based Intrusion Detection Systems --  |g 13.  |t Network-Based Intrusion Prevention Systems --  |g 14.  |t Host-Based Intrusion Prevention Systems --  |g 15.  |t Security Information Management Systems --  |g 16.  |t Network Session Analysis --  |g 17.  |t Digital Forensics --  |g 18.  |t System Integrity Validation --  |g 19.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t References --  |g 6.  |t Firewalls /  |r Dr. Errin W. Fulp --  |g 1.  |t Introduction --  |g 2.  |t Network Firewalls --  |g 3.  |t Firewall Security Policies --  |g 4.  |t A Simple Mathematical Model for Policies, Rules, and Packets --  |g 5.  |t First-Match Firewall Policy Anomalies --  |g 6.  |t Policy Optimization --  |g 7.  |t Firewall Types --  |g 8.  |t Host and Network Firewalls --  |g 9.  |t Software and Hardware Firewall Implementations --  |g 10.  |t Choosing the Correct Firewall --  |g 11.  |t Firewall Placement and Network Topology --  |g 12.  |t Firewall Installation and Configuration --  |g 13.  |t Supporting Outgoing Services Through Firewall Configuration --  |g 14.  |t Secure External Services Provisioning. 
505 0 0 |g 15.  |t Network Firewalls for Voice and Video Applications --  |g 16.  |t Firewalls and Important Administrative Service Protocols --  |g 17.  |t Internal IP Services Protection --  |g 18.  |t Firewall Remote Access Configuration --  |g 19.  |t Load Balancing and Firewall Arrays --  |g 20.  |t Highly Available Firewalls --  |g 21.  |t Firewall Management --  |g 22.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 7.  |t Penetration Testing /  |r Sanjay Bavisi --  |g 1.  |t Introduction --  |g 2.  |t What is Penetration Testing? --  |g 3.  |t How Does Penetration Testing Differ from an Actual "Hack?" --  |g 4.  |t Types of Penetration Testing --  |g 5.  |t Phases of Penetration Testing --  |g 6.  |t Defining What's Expected --  |g 7.  |t The Need for a Methodology --  |g 8.  |t Penetration Testing Methodologies --  |g 9.  |t Methodology in Action --  |g 10.  |t Penetration Testing Risks --  |g 11.  |t Liability Issues --  |g 12.  |t Legal Consequences --  |g 13.  |t "Get Out of Jail Free" Card --  |g 14.  |t Penetration Testing Consultants --  |g 15.  |t Required Skill Sets --  |g 16.  |t Accomplishments --  |g 17.  |t Hiring a Penetration Tester --  |g 18.  |t Why Should a Company Hire You? --  |g 19.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 8.  |t What is Vulnerability Assessment? /  |r Almantas Kakareka --  |g 1.  |t Introduction --  |g 2.  |t Reporting --  |g 3.  |t The "It Won't Happen to Us" Factor --  |g 4.  |t Why Vulnerability Assessment? --  |g 5.  |t Penetration Testing Versus Vulnerability Assessment --  |g 6.  |t Vulnerability Assessment Goal --  |g 7.  |t Mapping the Network --  |g 8.  |t Selecting the Right Scanners --  |g 9.  |t Central Scans Versus Local Scans --  |g 10.  |t Defense in Depth Strategy --  |g 11.  |t Vulnerability Assessment Tools --  |g 12.  |t SARA --  |g 13.  |t SAINT --  |g 14.  |t MBSA --  |g 15.  |t Scanner Performance --  |g 16.  |t Scan Verification --  |g 17.  |t Scanning Cornerstones --  |g 18.  |t Network Scanning Countermeasures --  |g 19.  |t Vulnerability Disclosure Date --  |g 20.  |t Proactive Security Versus Reactive Security --  |g 21.  |t Vulnerability Causes --  |g 22.  |t Diy Vulnerability Assessment --  |g 23.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 9.  |t Cyber Forensics /  |r Scott R. Ellis --  |g 1.  |t What is Cyber Forensics? --  |g 2.  |t Analysis of Data --  |g 3.  |t Cyber Forensics in the Court System --  |g 4.  |t Understanding Internet History --  |g 5.  |t Temporary Restraining Orders and Labor Disputes --  |g 6.  |t First Principles --  |g 7.  |t Hacking a Windows XP Password --  |g 8.  |t Network Analysis --  |g 9.  |t Cyber Forensics Applied --  |g 10.  |t Tracking, Inventory, Location of Files, Paperwork, Backups, and so on --  |g 11.  |t Testifying as an Expert --  |g 12.  |t Beginning to End in Court --  |g 13.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |g 10.  |t Cyber Forensics and Incident Response /  |r Cem Gurkok --  |g 1.  |t Introduction to Cyber Forensics --  |g 2.  |t Handling Preliminary Investigations --  |g 3.  |t Controlling an Investigation --  |g 4.  |t Conducting Disk-Based Analysis --  |g 5.  |t Investigating Information-Hiding Techniques --  |g 6.  |t Scrutinizing Email --  |g 7.  |t Validating Email Header Information --  |g 8.  |t Tracing Internet Access --  |g 9.  |t Searching Memory in Real Time --  |g 10.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise --  |t References --  |g 11.  |t Network Forensics /  |r Yong Guan --  |g 1.  |t Scientific Overview --  |g 2.  |t The Principles of Network Forensics --  |g 3.  |t Attack Traceback and Attribution --  |g 4.  |t Critical Needs Analysis --  |g 5.  |t Research Directions --  |g 6.  |t Summary --  |t Chapter Review Questions/Exercises --  |t Exercise. 
500 |a ScienceDirect eBook - Computer Science 2013 (Elsevier and Woodhead)  |5 TMurS 
500 |a EBSCO eBook Academic Comprehensive Collection North America  |5 TMurS 
650 0 |a Computer security  |x Management. 
650 0 |a Electronic data processing departments  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
700 1 |a Vacca, John R. 
730 0 |a WORLDSHARE SUB RECORDS 
758 |i has work:  |a Managing information security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG7BKH8BTPwrRcpGwp6R8C  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781299808348 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://www.sciencedirect.com/science/book/9780124166882  |z CONNECT  |3 Elsevier  |t 0 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=596634&authtype=ip,sso&custid=s4672406  |z CONNECT  |3 eBooks on EBSCOhost  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 4e46e9b7-1e1a-483f-91a9-526008a6f198  |i 4e46e9b7-1e1a-483f-91a9-526008a6f198  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.A25   |h Library of Congress classification