The Resource How to cheat at managing information security, Mark Osborne ; Paul M. Summitt, technical editor, (electronic resource)

How to cheat at managing information security, Mark Osborne ; Paul M. Summitt, technical editor, (electronic resource)

Label
How to cheat at managing information security
Title
How to cheat at managing information security
Statement of responsibility
Mark Osborne ; Paul M. Summitt, technical editor
Title variation
Managing information security
Creator
Contributor
Subject
Genre
Language
  • eng
  • eng
Summary
This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical detai
Member of
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Osborne, Mark
Dewey number
005.8
Index
no index present
Language note
English
LC call number
TK5105.59
LC item number
.O73 2006
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Summitt, Paul M
Series statement
How to Cheat
http://library.link/vocab/subjectName
  • Computer networks
  • Computer security
Label
How to cheat at managing information security, Mark Osborne ; Paul M. Summitt, technical editor, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; How to Cheat at Managing Information Security; Copyright Page; Contents; Security Policy Revisited; Preface; Introduction; Chapter 1. The Security Organization; Anecdote; Introduction; Where Should Security Sit? Below the CEO, CTO, or CFO; Your Mission: If You Choose to Accept It; Role of the Security Function: What's in a Job?; The Hybrid Security Team: Back to Organizational Studies; What Makes a Good CISO?; Summary; Chapter 2. The Information Security Policy; Anecdote; Introduction; Policy, Strategy, and Standards: Business Theory; Back to Security
  • The Security Strategy and the Security Planning ProcessSecurity Standards Revisited; Compliance and Enforcement; Summary; Chapter 3. Jargon, Principles, and Concepts; Anecdote; Introduction; CIA: Confidentiality, Integrity, and Availability; The Vulnerability Cycle; Types of Controls; Risk Analysis; AAA; Other Concepts You Need to Know; Generic Types of Attack; Summary; Chapter 4. Information Security Laws and Regulations; Anecdote; Introduction; U.K. Legislation; U.S. Legislation; Summary; Chapter 5. Information Security Standards and Audits; Anecdote; Introduction
  • ISO/IEC 27001:2005: What Now for BS 7799?PAS 56; FIPS 140-2; Common Criteria Certification; Types of Audit; Summary; Chapter 6. Interviews, Bosses, and Staff; Anecdote; Introduction; Bosses; Worst Employees; Summary; Chapter 7. Infrastructure Security; Anecdote; Introduction; E-commerce; Just Checking; Summary; Chapter 8. Firewalls; Anecdote; Introduction; Firewall Structure and Design; Other Types of Firewalls; Commercial Firewalls; Summary; Chapter 9. Intrusion Detection Systems: Theory; Anecdote; Introduction; Why Bother with an IDS?; NIDS in Your Hair; For the Technically Minded; Summary
  • Chapter 10. Intrusion Detection Systems: In PracticeAnecdote; Introduction: Tricks, Tips, and Techniques; IDS Deployment Methodology; Selection; Deployment; Information Management; Incident Response and Crisis Management; Test and Tune; Summary; Chapter 11. Intrusion Prevention and Protection; Anecdote; Introduction; What Is an IPS?; Active Response: What Can an IPS Do?; A Quick Tour of IPS Implementations; Example Deployments; Summary; Chapter 12. Network Penetration Testing; Anecdote; Introduction; Types of Penetration Testing; Network Penetration Testing
  • Controls and the Paperwork You NeedWhat's the Difference between a Pen Test and Hacking?; Summary; Chapter 13. Application Security Flaws and Application Testing; Anecdote; Introduction; Configuration Management; Unvalidated Input; Bad Identity Control; Fixing Things; For the More Technically Minded; Summary; Index
Dimensions
unknown
Extent
1 online resource (345 p.)
Form of item
online
Isbn
9781281072979
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)266207
  • (OCoLC)320315074
  • (SSID)ssj0000075191
  • (PQKBManifestationID)11123495
  • (PQKBTitleCode)TC0000075191
  • (PQKBWorkID)10128637
  • (PQKB)10857535
  • (MiAaPQ)EBC266207
  • (EXLCZ)991000000000339643
Label
How to cheat at managing information security, Mark Osborne ; Paul M. Summitt, technical editor, (electronic resource)
Publication
Note
Description based upon print version of record
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; How to Cheat at Managing Information Security; Copyright Page; Contents; Security Policy Revisited; Preface; Introduction; Chapter 1. The Security Organization; Anecdote; Introduction; Where Should Security Sit? Below the CEO, CTO, or CFO; Your Mission: If You Choose to Accept It; Role of the Security Function: What's in a Job?; The Hybrid Security Team: Back to Organizational Studies; What Makes a Good CISO?; Summary; Chapter 2. The Information Security Policy; Anecdote; Introduction; Policy, Strategy, and Standards: Business Theory; Back to Security
  • The Security Strategy and the Security Planning ProcessSecurity Standards Revisited; Compliance and Enforcement; Summary; Chapter 3. Jargon, Principles, and Concepts; Anecdote; Introduction; CIA: Confidentiality, Integrity, and Availability; The Vulnerability Cycle; Types of Controls; Risk Analysis; AAA; Other Concepts You Need to Know; Generic Types of Attack; Summary; Chapter 4. Information Security Laws and Regulations; Anecdote; Introduction; U.K. Legislation; U.S. Legislation; Summary; Chapter 5. Information Security Standards and Audits; Anecdote; Introduction
  • ISO/IEC 27001:2005: What Now for BS 7799?PAS 56; FIPS 140-2; Common Criteria Certification; Types of Audit; Summary; Chapter 6. Interviews, Bosses, and Staff; Anecdote; Introduction; Bosses; Worst Employees; Summary; Chapter 7. Infrastructure Security; Anecdote; Introduction; E-commerce; Just Checking; Summary; Chapter 8. Firewalls; Anecdote; Introduction; Firewall Structure and Design; Other Types of Firewalls; Commercial Firewalls; Summary; Chapter 9. Intrusion Detection Systems: Theory; Anecdote; Introduction; Why Bother with an IDS?; NIDS in Your Hair; For the Technically Minded; Summary
  • Chapter 10. Intrusion Detection Systems: In PracticeAnecdote; Introduction: Tricks, Tips, and Techniques; IDS Deployment Methodology; Selection; Deployment; Information Management; Incident Response and Crisis Management; Test and Tune; Summary; Chapter 11. Intrusion Prevention and Protection; Anecdote; Introduction; What Is an IPS?; Active Response: What Can an IPS Do?; A Quick Tour of IPS Implementations; Example Deployments; Summary; Chapter 12. Network Penetration Testing; Anecdote; Introduction; Types of Penetration Testing; Network Penetration Testing
  • Controls and the Paperwork You NeedWhat's the Difference between a Pen Test and Hacking?; Summary; Chapter 13. Application Security Flaws and Application Testing; Anecdote; Introduction; Configuration Management; Unvalidated Input; Bad Identity Control; Fixing Things; For the More Technically Minded; Summary; Index
Dimensions
unknown
Extent
1 online resource (345 p.)
Form of item
online
Isbn
9781281072979
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)266207
  • (OCoLC)320315074
  • (SSID)ssj0000075191
  • (PQKBManifestationID)11123495
  • (PQKBTitleCode)TC0000075191
  • (PQKBWorkID)10128637
  • (PQKB)10857535
  • (MiAaPQ)EBC266207
  • (EXLCZ)991000000000339643

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...