Cybersecurity operations handbook:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Digital Press
©2003
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security |
Beschreibung: | 1 Online-Ressource (xli, 1287 pages) |
ISBN: | 0080530184 1555583067 9780080530185 9781555583064 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044820 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2003 |||| o||u| ||||||eng d | ||
020 | |a 0080530184 |c electronic bk. |9 0-08-053018-4 | ||
020 | |a 1555583067 |9 1-55558-306-7 | ||
020 | |a 9780080530185 |c electronic bk. |9 978-0-08-053018-5 | ||
020 | |a 9781555583064 |9 978-1-55558-306-4 | ||
035 | |a (OCoLC)162595126 | ||
035 | |a (DE-599)BVBBV043044820 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Rittinghouse, John W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity operations handbook |c John W. Rittinghouse, William M. Hancock |
264 | 1 | |a Amsterdam |b Elsevier Digital Press |c ©2003 | |
300 | |a 1 Online-Ressource (xli, 1287 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents | ||
500 | |a Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security | ||
650 | 4 | |a Computer security / Handbooks, manuals, etc | |
650 | 4 | |a Computer networks / Security measures / Handbooks, manuals, etc | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Hancock, Bill |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469358 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175411040485376 |
---|---|
any_adam_object | |
author | Rittinghouse, John W. |
author_facet | Rittinghouse, John W. |
author_role | aut |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | BV043044820 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162595126 (DE-599)BVBBV043044820 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03545nmm a2200505zc 4500</leader><controlfield tag="001">BV043044820</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080530184</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-053018-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583067</subfield><subfield code="9">1-55558-306-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080530185</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-053018-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583064</subfield><subfield code="9">978-1-55558-306-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162595126</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044820</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity operations handbook</subfield><subfield code="c">John W. Rittinghouse, William M. Hancock</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Digital Press</subfield><subfield code="c">©2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xli, 1287 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hancock, Bill</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469358</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044820 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:51Z |
institution | BVB |
isbn | 0080530184 1555583067 9780080530185 9781555583064 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469358 |
oclc_num | 162595126 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xli, 1287 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Elsevier Digital Press |
record_format | marc |
spelling | Rittinghouse, John W. Verfasser aut Cybersecurity operations handbook John W. Rittinghouse, William M. Hancock Amsterdam Elsevier Digital Press ©2003 1 Online-Ressource (xli, 1287 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security Computer security / Handbooks, manuals, etc Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Hancock, Bill Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316 Aggregator Volltext |
spellingShingle | Rittinghouse, John W. Cybersecurity operations handbook Computer security / Handbooks, manuals, etc Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Cybersecurity operations handbook |
title_auth | Cybersecurity operations handbook |
title_exact_search | Cybersecurity operations handbook |
title_full | Cybersecurity operations handbook John W. Rittinghouse, William M. Hancock |
title_fullStr | Cybersecurity operations handbook John W. Rittinghouse, William M. Hancock |
title_full_unstemmed | Cybersecurity operations handbook John W. Rittinghouse, William M. Hancock |
title_short | Cybersecurity operations handbook |
title_sort | cybersecurity operations handbook |
topic | Computer security / Handbooks, manuals, etc Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | Computer security / Handbooks, manuals, etc Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316 |
work_keys_str_mv | AT rittinghousejohnw cybersecurityoperationshandbook AT hancockbill cybersecurityoperationshandbook |