The best damn IT security management book period /:
The "Swiss Army knife" for security professionals!
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, Mass. :
Syngress,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The "Swiss Army knife" for security professionals! |
Beschreibung: | 1 online resource (1 volume) |
ISBN: | 9780080557335 0080557333 1281145173 9781281145178 9786611145170 6611145176 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn236383873 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 080609s2007 maua o 001 0 eng d | ||
010 | |z 2008295095 | ||
040 | |a CtWfDGI |b eng |e pn |c COCUF |d N$T |d YDXCP |d MERUC |d UBY |d UMI |d CEF |d E7B |d OCLCQ |d NHM |d IDEBK |d OCLCQ |d B24X7 |d DEBSZ |d OCLCQ |d OCLCO |d VLB |d OCLCQ |d OCLCF |d OCLCO |d OPELS |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d LIV |d OCLCQ |d JBG |d OCLCA |d D6H |d VTS |d ZZAND |d AU@ |d STF |d M8D |d VT2 |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL | ||
015 | |a GBA7A0421 |2 bnb | ||
016 | 7 | |a 014465042 |2 Uk | |
019 | |a 191703042 |a 228148556 |a 402442075 |a 441819217 |a 505059012 |a 648331449 |a 916415038 |a 1044299856 |a 1056438091 |a 1057970747 |a 1153049876 |a 1259087647 | ||
020 | |a 9780080557335 |q (electronic bk.) | ||
020 | |a 0080557333 |q (electronic bk.) | ||
020 | |z 9781597492270 | ||
020 | |z 1597492272 |q (Paper) | ||
020 | |a 1281145173 | ||
020 | |a 9781281145178 | ||
020 | |a 9786611145170 | ||
020 | |a 6611145176 | ||
035 | |a (OCoLC)236383873 |z (OCoLC)191703042 |z (OCoLC)228148556 |z (OCoLC)402442075 |z (OCoLC)441819217 |z (OCoLC)505059012 |z (OCoLC)648331449 |z (OCoLC)916415038 |z (OCoLC)1044299856 |z (OCoLC)1056438091 |z (OCoLC)1057970747 |z (OCoLC)1153049876 |z (OCoLC)1259087647 | ||
037 | |a CL0500000043 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 |b B486 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 4 | |a The best damn IT security management book period / |c Bryan Cunningham [and others]. |
260 | |a Burlington, Mass. : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (1 volume) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
505 | 0 | |a pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. | |
520 | |a The "Swiss Army knife" for security professionals! | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer security |x Management. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Management |2 fast | |
700 | 1 | |a Susan Snedaker. |4 aut | |
700 | 1 | |a Cunningham, Bryan, |c JD. |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjCWdW9QvRQ4R4Vp8VbDbd |0 http://id.loc.gov/authorities/names/no2005098229 | |
758 | |i has work: |a The best damn IT security management book period (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFXmr9BxjPvgqt6yx78VFq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Cunningham, Bryan, JD. |t Best damn IT security management book period. |d Burlington, MA : Syngress, ©2007 |z 9781597492270 |z 1597492272 |w (OCoLC)183149789 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216952 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597492270 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00025442 | ||
938 | |a EBSCOhost |b EBSC |n 216952 | ||
938 | |a YBP Library Services |b YANK |n 2766990 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn236383873 |
---|---|
_version_ | 1816881669752225792 |
adam_text | |
any_adam_object | |
author | Susan Snedaker Cunningham, Bryan, JD |
author_GND | http://id.loc.gov/authorities/names/no2005098229 |
author_facet | Susan Snedaker Cunningham, Bryan, JD |
author_role | aut aut |
author_sort | Susan Snedaker |
author_variant | s s ss b c bc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B486 2007eb |
callnumber-search | QA76.9.A25 B486 2007eb |
callnumber-sort | QA 276.9 A25 B486 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. |
ctrlnum | (OCoLC)236383873 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04954cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn236383873</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">080609s2007 maua o 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008295095</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CtWfDGI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">COCUF</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">UBY</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NHM</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OPELS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">ZZAND</subfield><subfield code="d">AU@</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA7A0421</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">014465042</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">191703042</subfield><subfield code="a">228148556</subfield><subfield code="a">402442075</subfield><subfield code="a">441819217</subfield><subfield code="a">505059012</subfield><subfield code="a">648331449</subfield><subfield code="a">916415038</subfield><subfield code="a">1044299856</subfield><subfield code="a">1056438091</subfield><subfield code="a">1057970747</subfield><subfield code="a">1153049876</subfield><subfield code="a">1259087647</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080557335</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080557333</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597492270</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597492272</subfield><subfield code="q">(Paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281145173</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281145178</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611145170</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611145176</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)236383873</subfield><subfield code="z">(OCoLC)191703042</subfield><subfield code="z">(OCoLC)228148556</subfield><subfield code="z">(OCoLC)402442075</subfield><subfield code="z">(OCoLC)441819217</subfield><subfield code="z">(OCoLC)505059012</subfield><subfield code="z">(OCoLC)648331449</subfield><subfield code="z">(OCoLC)916415038</subfield><subfield code="z">(OCoLC)1044299856</subfield><subfield code="z">(OCoLC)1056438091</subfield><subfield code="z">(OCoLC)1057970747</subfield><subfield code="z">(OCoLC)1153049876</subfield><subfield code="z">(OCoLC)1259087647</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000043</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B486 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="4"><subfield code="a">The best damn IT security management book period /</subfield><subfield code="c">Bryan Cunningham [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, Mass. :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The "Swiss Army knife" for security professionals!</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susan Snedaker.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cunningham, Bryan,</subfield><subfield code="c">JD.</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjCWdW9QvRQ4R4Vp8VbDbd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005098229</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The best damn IT security management book period (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFXmr9BxjPvgqt6yx78VFq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Cunningham, Bryan, JD.</subfield><subfield code="t">Best damn IT security management book period.</subfield><subfield code="d">Burlington, MA : Syngress, ©2007</subfield><subfield code="z">9781597492270</subfield><subfield code="z">1597492272</subfield><subfield code="w">(OCoLC)183149789</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216952</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597492270</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00025442</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">216952</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2766990</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn236383873 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:24Z |
institution | BVB |
isbn | 9780080557335 0080557333 1281145173 9781281145178 9786611145170 6611145176 |
language | English |
oclc_num | 236383873 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress, |
record_format | marc |
spelling | The best damn IT security management book period / Bryan Cunningham [and others]. Burlington, Mass. : Syngress, ©2007. 1 online resource (1 volume) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. The "Swiss Army knife" for security professionals! Print version record. English. Computer security Management. Sécurité informatique Gestion. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security Management fast Susan Snedaker. aut Cunningham, Bryan, JD. aut https://id.oclc.org/worldcat/entity/E39PCjCWdW9QvRQ4R4Vp8VbDbd http://id.loc.gov/authorities/names/no2005098229 has work: The best damn IT security management book period (Text) https://id.oclc.org/worldcat/entity/E39PCFXmr9BxjPvgqt6yx78VFq https://id.oclc.org/worldcat/ontology/hasWork Print version: Cunningham, Bryan, JD. Best damn IT security management book period. Burlington, MA : Syngress, ©2007 9781597492270 1597492272 (OCoLC)183149789 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216952 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597492270 Volltext |
spellingShingle | Susan Snedaker Cunningham, Bryan, JD The best damn IT security management book period / pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. The Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists. Computer security Management. Sécurité informatique Gestion. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security Management fast |
title | The best damn IT security management book period / |
title_auth | The best damn IT security management book period / |
title_exact_search | The best damn IT security management book period / |
title_full | The best damn IT security management book period / Bryan Cunningham [and others]. |
title_fullStr | The best damn IT security management book period / Bryan Cunningham [and others]. |
title_full_unstemmed | The best damn IT security management book period / Bryan Cunningham [and others]. |
title_short | The best damn IT security management book period / |
title_sort | best damn it security management book period |
topic | Computer security Management. Sécurité informatique Gestion. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security Management fast |
topic_facet | Computer security Management. Sécurité informatique Gestion. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Management |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216952 https://www.sciencedirect.com/science/book/9781597492270 |
work_keys_str_mv | AT susansnedaker thebestdamnitsecuritymanagementbookperiod AT cunninghambryan thebestdamnitsecuritymanagementbookperiod AT susansnedaker bestdamnitsecuritymanagementbookperiod AT cunninghambryan bestdamnitsecuritymanagementbookperiod |