Physical and logical security convergence powered by enterprise security management:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxvi, 566 p.) |
ISBN: | 008055878X 1597491225 9780080558783 9781597491228 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043045198 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2007 |||| o||u| ||||||eng d | ||
020 | |a 008055878X |c electronic bk. |9 0-08-055878-X | ||
020 | |a 1597491225 |9 1-59749-122-5 | ||
020 | |a 9780080558783 |c electronic bk. |9 978-0-08-055878-3 | ||
020 | |a 9781597491228 |9 978-1-59749-122-8 | ||
035 | |a (OCoLC)228148066 | ||
035 | |a (DE-599)BVBBV043045198 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 658.478 |2 22 | |
082 | 0 | |a P578 | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Physical and logical security convergence powered by enterprise security management |c Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (xxvi, 566 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide | ||
500 | |a 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology |2 fast | |
650 | 4 | |a Information technology | |
650 | 4 | |a Computer security | |
700 | 1 | |a Contos, Brian T. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469736 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175411829014528 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043045198 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)228148066 (DE-599)BVBBV043045198 |
dewey-full | 658.478 005.8 |
dewey-hundreds | 600 - Technology (Applied sciences) 000 - Computer science, information, general works |
dewey-ones | 658 - General management 005 - Computer programming, programs, data, security |
dewey-raw | 658.478 P578 005.8 |
dewey-search | 658.478 P578 005.8 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03946nmm a2200505zc 4500</leader><controlfield tag="001">BV043045198</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055878X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055878-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491225</subfield><subfield code="9">1-59749-122-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558783</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055878-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491228</subfield><subfield code="9">978-1-59749-122-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228148066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043045198</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">P578</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical and logical security convergence powered by enterprise security management</subfield><subfield code="c">Brian T. Contos ... [et al.] ; foreword by Regis McKenna</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 566 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Contos, Brian T.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469736</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043045198 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:52Z |
institution | BVB |
isbn | 008055878X 1597491225 9780080558783 9781597491228 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469736 |
oclc_num | 228148066 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxvi, 566 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna Burlington, MA Syngress Pub. c2007 1 Online-Ressource (xxvi, 566 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information technology fast Information technology Computer security Contos, Brian T. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832 Aggregator Volltext |
spellingShingle | Physical and logical security convergence powered by enterprise security management COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information technology fast Information technology Computer security |
title | Physical and logical security convergence powered by enterprise security management |
title_auth | Physical and logical security convergence powered by enterprise security management |
title_exact_search | Physical and logical security convergence powered by enterprise security management |
title_full | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
title_fullStr | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
title_full_unstemmed | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
title_short | Physical and logical security convergence powered by enterprise security management |
title_sort | physical and logical security convergence powered by enterprise security management |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information technology fast Information technology Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Information technology |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=230832 |
work_keys_str_mv | AT contosbriant physicalandlogicalsecurityconvergencepoweredbyenterprisesecuritymanagement |