Physical and logical security convergence powered by enterprise security management /:
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two di...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxvi, 566 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781597491228 1597491225 9780080558783 008055878X 1281325473 9781281325471 9786611325473 6611325476 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn228148066 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 080516s2007 maua ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d N$T |d IDEBK |d E7B |d DKDLA |d OCLCQ |d OCLCF |d UMI |d DEBBG |d DEBSZ |d YDXCP |d OCLCQ |d COO |d AGLDB |d OCLCA |d D6H |d OCLCQ |d VTS |d CEF |d WYU |d JBG |d STF |d LEAUB |d M8D |d OCLCQ |d K6U |d VT2 |d VLY |d OCLCQ |d OCLCO |d DST |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 243694635 |a 473205316 |a 646747337 |a 871683730 |a 1065943741 |a 1156359495 |a 1162002508 |a 1241950065 |a 1300530800 | ||
020 | |a 9781597491228 | ||
020 | |a 1597491225 | ||
020 | |a 9780080558783 |q (electronic bk.) | ||
020 | |a 008055878X |q (electronic bk.) | ||
020 | |a 1281325473 | ||
020 | |a 9781281325471 | ||
020 | |a 9786611325473 | ||
020 | |a 6611325476 | ||
024 | 1 | |z 792502912256 | |
035 | |a (OCoLC)228148066 |z (OCoLC)243694635 |z (OCoLC)473205316 |z (OCoLC)646747337 |z (OCoLC)871683730 |z (OCoLC)1065943741 |z (OCoLC)1156359495 |z (OCoLC)1162002508 |z (OCoLC)1241950065 |z (OCoLC)1300530800 | ||
037 | |a 136665:136799 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b P49 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 658.478 |b P578 |2 22 | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Physical and logical security convergence powered by enterprise security management / |c Brian T. Contos [and others] ; foreword by Regis McKenna. |
260 | |a Burlington, MA : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (xxvi, 566 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide. | ||
505 | 0 | |a 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts. | |
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
546 | |a English. | ||
650 | 0 | |a Information technology. |0 http://id.loc.gov/authorities/subjects/sh87002293 | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Technologie de l'information. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a information technology. |2 aat | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology |2 fast | |
700 | 1 | |a Contos, Brian T. |0 http://id.loc.gov/authorities/names/nb2007016723 | |
758 | |i has work: |a Physical and logical security convergence powered by enterprise security management (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGJT6XfFftRWCmQ7KCprjd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Physical and logical security convergence powered by enterprise security management. |d Burlington, MA : Syngress Pub., ©2007 |z 9781597491228 |z 1597491225 |w (DLC) 2007296815 |w (OCoLC)123894828 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597491228 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=230832 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10229412 | ||
938 | |a EBSCOhost |b EBSC |n 230832 | ||
938 | |a YBP Library Services |b YANK |n 2820998 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn228148066 |
---|---|
_version_ | 1816881666469134336 |
adam_text | |
any_adam_object | |
author2 | Contos, Brian T. |
author2_role | |
author2_variant | b t c bt btc |
author_GND | http://id.loc.gov/authorities/names/nb2007016723 |
author_facet | Contos, Brian T. |
author_sort | Contos, Brian T. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 P49 2007eb |
callnumber-search | QA76.9.A25 P49 2007eb |
callnumber-sort | QA 276.9 A25 P49 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts. |
ctrlnum | (OCoLC)228148066 |
dewey-full | 658.478 005.8 |
dewey-hundreds | 600 - Technology (Applied sciences) 000 - Computer science, information, general works |
dewey-ones | 658 - General management 005 - Computer programming, programs, data, security |
dewey-raw | 658.478 005.8 |
dewey-search | 658.478 005.8 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05389cam a2200721 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn228148066</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080516s2007 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBBG</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">WYU</subfield><subfield code="d">JBG</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">VT2</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">243694635</subfield><subfield code="a">473205316</subfield><subfield code="a">646747337</subfield><subfield code="a">871683730</subfield><subfield code="a">1065943741</subfield><subfield code="a">1156359495</subfield><subfield code="a">1162002508</subfield><subfield code="a">1241950065</subfield><subfield code="a">1300530800</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491228</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491225</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558783</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055878X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281325473</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281325471</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611325473</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611325476</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="z">792502912256</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228148066</subfield><subfield code="z">(OCoLC)243694635</subfield><subfield code="z">(OCoLC)473205316</subfield><subfield code="z">(OCoLC)646747337</subfield><subfield code="z">(OCoLC)871683730</subfield><subfield code="z">(OCoLC)1065943741</subfield><subfield code="z">(OCoLC)1156359495</subfield><subfield code="z">(OCoLC)1162002508</subfield><subfield code="z">(OCoLC)1241950065</subfield><subfield code="z">(OCoLC)1300530800</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">136665:136799</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">P49 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.478</subfield><subfield code="b">P578</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Physical and logical security convergence powered by enterprise security management /</subfield><subfield code="c">Brian T. Contos [and others] ; foreword by Regis McKenna.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 566 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh87002293</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">information technology.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Contos, Brian T.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2007016723</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Physical and logical security convergence powered by enterprise security management (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGJT6XfFftRWCmQ7KCprjd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Physical and logical security convergence powered by enterprise security management.</subfield><subfield code="d">Burlington, MA : Syngress Pub., ©2007</subfield><subfield code="z">9781597491228</subfield><subfield code="z">1597491225</subfield><subfield code="w">(DLC) 2007296815</subfield><subfield code="w">(OCoLC)123894828</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597491228</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=230832</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10229412</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">230832</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2820998</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn228148066 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:21Z |
institution | BVB |
isbn | 9781597491228 1597491225 9780080558783 008055878X 1281325473 9781281325471 9786611325473 6611325476 |
language | English |
oclc_num | 228148066 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvi, 566 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Physical and logical security convergence powered by enterprise security management / Brian T. Contos [and others] ; foreword by Regis McKenna. Burlington, MA : Syngress Pub., ©2007. 1 online resource (xxvi, 566 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide. 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts. Includes index. Print version record. Includes bibliographical references and index. English. Information technology. http://id.loc.gov/authorities/subjects/sh87002293 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Technologie de l'information. Sécurité informatique. information technology. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Information technology fast Contos, Brian T. http://id.loc.gov/authorities/names/nb2007016723 has work: Physical and logical security convergence powered by enterprise security management (Text) https://id.oclc.org/worldcat/entity/E39PCGJT6XfFftRWCmQ7KCprjd https://id.oclc.org/worldcat/ontology/hasWork Print version: Physical and logical security convergence powered by enterprise security management. Burlington, MA : Syngress Pub., ©2007 9781597491228 1597491225 (DLC) 2007296815 (OCoLC)123894828 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597491228 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=230832 Volltext |
spellingShingle | Physical and logical security convergence powered by enterprise security management / 1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance -- Data Center Snapshots -- Video Surveillance -- Tailgating -- 16. Environmental Controls -- Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts. Information technology. http://id.loc.gov/authorities/subjects/sh87002293 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Technologie de l'information. Sécurité informatique. information technology. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Information technology fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh87002293 https://id.nlm.nih.gov/mesh/D016494 |
title | Physical and logical security convergence powered by enterprise security management / |
title_auth | Physical and logical security convergence powered by enterprise security management / |
title_exact_search | Physical and logical security convergence powered by enterprise security management / |
title_full | Physical and logical security convergence powered by enterprise security management / Brian T. Contos [and others] ; foreword by Regis McKenna. |
title_fullStr | Physical and logical security convergence powered by enterprise security management / Brian T. Contos [and others] ; foreword by Regis McKenna. |
title_full_unstemmed | Physical and logical security convergence powered by enterprise security management / Brian T. Contos [and others] ; foreword by Regis McKenna. |
title_short | Physical and logical security convergence powered by enterprise security management / |
title_sort | physical and logical security convergence powered by enterprise security management |
topic | Information technology. http://id.loc.gov/authorities/subjects/sh87002293 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Technologie de l'information. Sécurité informatique. information technology. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Information technology fast |
topic_facet | Information technology. Computer security. Computer Security Technologie de l'information. Sécurité informatique. information technology. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Information technology |
url | https://www.sciencedirect.com/science/book/9781597491228 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=230832 |
work_keys_str_mv | AT contosbriant physicalandlogicalsecurityconvergencepoweredbyenterprisesecuritymanagement |