語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Practical network security = an auditee's guide to zero findings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Practical network security / Neha Saxena.
其他題名:
an auditee's guide to zero findings /
作者:
Saxena, Neha.
面頁冊數:
1 online resource (329 pages)
標題:
COMPUTERS / Security / Network Security. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000041.html
ISBN:
9789387284609
Practical network security = an auditee's guide to zero findings /
Saxena, Neha.
Practical network security
an auditee's guide to zero findings /[electronic resource] :Neha Saxena. - 1 online resource (329 pages)
Includes bibliographical references and index.
Practical network security : an auditee's guide to zero findings -- Dedication -- About the Author -- Acknowledgement -- Introduction -- Table of Contents -- Section 1 Information Security Basics -- Chapter 1 Basics of Information Security -- Chapter 2 Threat Paradigm -- Chapter 3 Information Security Controls -- Chapter 4 Decoding Policies Standards Procedures & Guidelines -- Chapter 5 Network Security Design -- Chapter 6 Know Your Assets -- Chapter 7 Implementing Network Security -- Chapter 8 Secure Change Management -- Chapter 9 Vulnerability and Risk Management -- Chapter 10 Access Control -- Chapter 11 Capacity Management -- Chapter 12 Log Management -- Chapter 13 Network Monitoring -- Chapter 14 Information Security Audit -- Chapter 15 Technical Compliance Audit -- Chapter 16 Penetration Testing.
Access restricted to authorized users and institutions.
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies. With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.
Mode of access: World Wide Web.
ISBN: 9789387284609Subjects--Topical Terms:
1483836
COMPUTERS / Security / Network Security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9
Dewey Class. No.: 005
Practical network security = an auditee's guide to zero findings /
LDR
:02540nam a2200289 i 4500
001
1157280
006
m eo d
007
cr cn |||m|||a
008
250717s2018 ob 000 0 eng d
020
$a
9789387284609
020
$a
9789388176521
035
$a
BPB0000041
041
0
$a
eng
050
0 0
$a
QA76.9
082
0 0
$a
005
100
1
$a
Saxena, Neha.
$e
author.
$1
https://orcid.org/0000-0001-9191-7006
$3
1306047
245
1 0
$a
Practical network security
$h
[electronic resource] :
$b
an auditee's guide to zero findings /
$c
Neha Saxena.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2018.
264
4
$c
©2021
300
$a
1 online resource (329 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Practical network security : an auditee's guide to zero findings -- Dedication -- About the Author -- Acknowledgement -- Introduction -- Table of Contents -- Section 1 Information Security Basics -- Chapter 1 Basics of Information Security -- Chapter 2 Threat Paradigm -- Chapter 3 Information Security Controls -- Chapter 4 Decoding Policies Standards Procedures & Guidelines -- Chapter 5 Network Security Design -- Chapter 6 Know Your Assets -- Chapter 7 Implementing Network Security -- Chapter 8 Secure Change Management -- Chapter 9 Vulnerability and Risk Management -- Chapter 10 Access Control -- Chapter 11 Capacity Management -- Chapter 12 Log Management -- Chapter 13 Network Monitoring -- Chapter 14 Information Security Audit -- Chapter 15 Technical Compliance Audit -- Chapter 16 Penetration Testing.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies. With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000041.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入