語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Physical and logical security conver...
~
Contos, Brian T.
Physical and logical security convergence powered by enterprise security management
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Physical and logical security convergence powered by enterprise security management/ Brian T. Contos ... [et. al] ; foreword by Regis McKenna.
其他作者:
Contos, Brian T.
出版者:
Burlington, MA :Syngress Publishing, : c2007.,
面頁冊數:
xxvi, 566 p. :ill. ; : 23 cm.;
附註:
Includes index.
標題:
Computer security. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781597491228 (paper)
Physical and logical security convergence powered by enterprise security management
Physical and logical security convergence powered by enterprise security management
[electronic resource] /Brian T. Contos ... [et. al] ; foreword by Regis McKenna. - Burlington, MA :Syngress Publishing,c2007. - xxvi, 566 p. :ill. ;23 cm.
Includes index.
1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance - Data Center Snapshots - Video Surveillance - Tailgating -- 16. Environmental Controls - Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts.
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2008.
Mode of access: World Wide Web.
ISBN: 9781597491228 (paper)Subjects--Topical Terms:
557122
Computer security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / P49 2007eb
Dewey Class. No.: 658.478
Physical and logical security convergence powered by enterprise security management
LDR
:03159nam a22002774a 4500
001
613787
003
OCoLC
005
20091117094506.0
006
m d
007
cr cn
008
091218s2007 maua s 001 0 eng d
020
$a
9781597491228 (paper)
020
$a
1597491225 (paper)
035
$a
(OCoLC)228148066
035
$a
ocn228148066
040
$a
OPELS
$c
OPELS
050
1 4
$a
QA76.9.A25
$b
P49 2007eb
082
0 4
$a
658.478
$2
22
082
0 4
$a
005.8
$2
22
245
0 0
$a
Physical and logical security convergence powered by enterprise security management
$h
[electronic resource] /
$c
Brian T. Contos ... [et. al] ; foreword by Regis McKenna.
260
$a
Burlington, MA :
$c
c2007.
$b
Syngress Publishing,
300
$a
xxvi, 566 p. :
$b
ill. ;
$c
23 cm.
500
$a
Includes index.
505
0
$a
1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- 5. Identity Management and & Access Control -- 6. Video Surveillance & Video Analysis -- 7. Selling Security: R.O.I. & Enterprise Deployments -- 8. The New Security Organization: The Trusted Enterprise -- 9. ESM Architecture -- 10. ESM Log Collection -- 11. ESM Event Processing, Real-Time Analysis, and Response -- 12. ESM Event Storage and Forensic Analysis -- 13. Bridging the Chinese Wall -- 14. Physical Controls -- 15. Video Surveillance - Data Center Snapshots - Video Surveillance - Tailgating -- 16. Environmental Controls - Dell, NetBIOS -- 17. Oil and Gas: SCADA -- 18: Final Thoughts.
520
$a
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2008.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on May 14, 2008).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
557122
650
0
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Contos, Brian T.
$3
641805
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491228
$z
An electronic book accessible through the World Wide Web; click for information
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入