Surviving Security

Surviving Security

Author: Amanda Andress

Publisher: CRC Press

Published: 2003-12-18

Total Pages: 529

ISBN-13: 0203501403

DOWNLOAD EBOOK

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that conside


Surviving Security

Surviving Security

Author: Amanda Andress

Publisher: CRC Press

Published: 2003-12-18

Total Pages: 529

ISBN-13: 1135491631

DOWNLOAD EBOOK

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions. About the Author Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.


A Business Guide to Information Security

A Business Guide to Information Security

Author: Alan Calder

Publisher: Kogan Page Publishers

Published: 2005

Total Pages: 198

ISBN-13: 9780749443955

DOWNLOAD EBOOK

Nontechnical, simple, and straightforward, this handbook offers valuable advice to help managers protect their companies from malicious and criminal IT activity.


Information Security Management Handbook on CD-ROM, 2006 Edition

Information Security Management Handbook on CD-ROM, 2006 Edition

Author: Micki Krause

Publisher: CRC Press

Published: 2006-04-06

Total Pages: 4346

ISBN-13: 0849385857

DOWNLOAD EBOOK

The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats at every turn. The Information Security Management Handbook on CD-ROM, 2006 Edition is now available. Containing the complete contents of the Information Security Management Handbook, this is a resource that is portable, linked and searchable by keyword. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information that is not found anywhere else, including chapters from other security and networking books that have never appeared in the print editions. Exportable text and hard copies are available at the click of a mouse. The Handbook's numerous authors present the ten domains of the Information Security Common Body of Knowledge (CBK) ®. The CD-ROM serves as an everyday reference for information security practitioners and an important tool for any one preparing for the Certified Information System Security Professional (CISSP) ® examination. New content to this Edition: Sensitive/Critical Data Access Controls Role-Based Access Control Smartcards A Guide to Evaluating Tokens Identity Management-Benefits and Challenges An Examination of Firewall Architectures The Five "W's" and Designing a Secure Identity Based Self-Defending Network Maintaining Network Security-Availability via Intelligent Agents PBX Firewalls: Closing the Back Door Voice over WLAN Spam Wars: How to Deal with Junk E-Mail Auditing the Telephony System: Defenses against Communications Security Breaches and Toll Fraud The "Controls" Matrix Information Security Governance


Information Security Management Handbook, Sixth Edition

Information Security Management Handbook, Sixth Edition

Author: Harold F. Tipton

Publisher: CRC Press

Published: 2007-05-14

Total Pages: 3279

ISBN-13: 0849374952

DOWNLOAD EBOOK

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.


Surviving the International War Zone

Surviving the International War Zone

Author: Robert R. Rail

Publisher: CRC Press

Published: 2010-10-27

Total Pages: 344

ISBN-13: 1439827958

DOWNLOAD EBOOK

Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accou


Information Security and Auditing in the Digital Age

Information Security and Auditing in the Digital Age

Author: Amjad Umar

Publisher: nge solutions, inc

Published: 2003-12

Total Pages: 552

ISBN-13: 9780972741477

DOWNLOAD EBOOK

This book provides a recent and relevant coverage based on a systematic approach. Especially suitable for practitioners and managers, the book has also been classroom tested in IS/IT courses on security. It presents a systematic approach to build total systems solutions that combine policies, procedures, risk analysis, threat assessment through attack trees, honeypots, audits, and commercially available security packages to secure the modern IT assets (applications, databases, hosts, middleware services and platforms) as well as the paths (the wireless plus wired network) to these assets. After covering the security management and technology principles, the book shows how these principles can be used to protect the digital enterprise assets. The emphasis is on modern issues such as e-commerce, e-business and mobile application security; wireless security that includes security of Wi-Fi LANs, cellular networks, satellites, wireless home networks, wireless middleware, and mobile application servers; semantic Web security with a discussion of XML security; Web Services security, SAML (Security Assertion Markup Language)and .NET security; integration of control and audit concepts in establishing a secure environment. Numerous real-life examples and a single case study that is developed throughout the book highlight a case-oriented approach. Complete instructor materials (PowerPoint slides, course outline, project assignments) to support an academic or industrial course are provided. Additional details can be found at the author website (www.amjadumar.com)


Secure IT Systems

Secure IT Systems

Author: Helger Lipmaa

Publisher: Springer

Published: 2017-11-03

Total Pages: 318

ISBN-13: 3319702904

DOWNLOAD EBOOK

This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.


Information Technology Risk Management in Enterprise Environments

Information Technology Risk Management in Enterprise Environments

Author: Jake Kouns

Publisher: John Wiley & Sons

Published: 2011-10-04

Total Pages: 346

ISBN-13: 1118211618

DOWNLOAD EBOOK

Discusses all types of corporate risks and practical means of defending against them. Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations. Offers an effective risk management program, which is the most critical function of an information security program.