Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI Table of Contents Copyright About the Authors About the Technical Reviewers Acknowledgments Icons Used in This Book Introduction Part I. Vulnerabilities and Technologies
Chapter 1. Hackers and Threats
Contending with Vulnerability Analyzing Hacking Threats Classification The Future of Hacking and Security Summary End Notes Endnotes
Chapter 2. Crucial Need for Security: Vulnerabilities and Attacks
Recognizing Vulnerabilities Categories of Attacks Additional Common Attacks Wireless Intrusions Social Engineering Summary of Attacks Cisco SAFE Axioms Summary
Chapter 3. Security Technology and Related Equipment
Virus Protection Traffic Filtering and Firewalls Encryption Authentication, Authorization, and Accounting: AAA Public Key Infrastructure From Detection to Prevention: Intrusion-Detection Systems and Intrusion-Prevention Systems Content Filtering Assessment and Audit Additional Mitigation Methods Summary End Notes Endnotes
Chapter 4. Putting It All Together: Threats and Security Equipment
Threats, Targets, and Trends Lowering Risk Exposure Security Topologies Summary
Part II. Human and Financial Issues
Chapter 5. Policy, Personnel, and Equipment as Security Enablers
Securing the Organization: Equipment and Access Managing the Availability and Integrity of Operations Implementing New Software and Privacy Concerns Regulating Interactivity Through Information and Equipment Control Mobilizing the Human Element: Creating a Secure Culture Creating Guidelines Through the Establishment of Procedural Requirements Determining Rules and Defining Compliance Securing the Future: Business Continuity Planning Ensuring a Successful Security Policy Approach Surveying IT Management Summary
Chapter 6. A Matter of Governance: Taking Security to the Board
SecurityA Governance Issue Directing Security Initiatives Establishing a Secure Culture Involving the Board Summary End Notes
Chapter 7. Creating Demand for the Security Proposal: IT Management's Role
Delivering the Security Message to Executive Management Recognizing the Goals of the Corporation Outlining Methods IT Managers Can Use to Engage the Organization Assessing Senior Business Management Security Requirements Summary
Chapter 8. Risk Aversion and Security Topologies
Risk Aversion Risk-Aversion Quotient Security Modeling Diminishing Returns Summary
Chapter 9. Return on Prevention: Investing in Capital Assets
Examining Cost of Attacks Budgeting for Security Equipment Analyzing Returns on Security Capital Investments Acknowledging Nonmathematical Security Fundamentals Summary End Notes
Part III. Policies and Future
Chapter 10. Essential Elements of Security Policy Development
Determining Required Policies Constructing Reliable and Sound Policies Using Policy Tools and Policy Implementation Considerations Performing Comprehensive Monitoring Knowing Policy Types Handling Incidents Summary
Chapter 11. Security Is a Living Process
Security Wheel Scalability Jurisprudence SWOT: Strengths, Weaknesses, Opportunities, and Threats Summary End Note
Part IV. Appendixes
Appendix A. References Appendix B. OSI Model, Internet Protocol, and Packets
OSI Model Internet Protocol IP Packet
Appendix C. Quick Guides to Security Technologies
Cheat Sheet 1: Routers Cheat Sheet 2: Hubs and Switches Cheat Sheet 3: Perimeter Routers and Firewalls Cheat Sheet 4: Intrusion-Detection Systems Cheat Sheet 5: Virtual Private Networks and Authentication Cheat Sheet 6: Comprehensive Security Topology
Appendix D. Return on Prevention Calculations Reference Sheets
Security Costs Calculations Financial Value Calculations
Glossary
Index
A B C D E F G H I J K L M N O P Q R S T U V W
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion