Enterprise Security
Rajat Khare, Varun Srivastava
SKU: 9788183332408
FREE PREVIEW
Authors: Rajat Khare, Varun Srivastava
Rights: Worldwide
Publishing Date: January 2008
Pages: 198
Weight:
Dimension: 24.5 X 18.5 X 1 cm
Looking for an eBook ? Click here
The tough waters of today make security of enterprise mechanisms one of the top priorities on most CIO'S agenda. This book covers both concepts and implementation of enterprise security from a holistic, process-oriented perspective. While still uncommon, the approaches listed herein certainly best model the threats that affect our installations. This book will explain you to look security based on risk assessment and worries about all aspects of the system equally. After all we do not want to be building bullet-proof steel doors in a house made of paper walls. After discussion the main challenges that make achieving optimal security difficult, we will concentrate on these process-based holistic approaches: Vulnerability Scanning, Simplified Security Risk Analysis. Threat Modelling, Intrusion Prevention/Detection System, Information Security Management Systems and Security Framework. This book will also help you in achieving compliances such as ISO27001, and OWASP. It will provide you with the knowledge and skills to begin supporting network security within your organization. Upon completion of this volume, you would be able to identify security threats and vulnerabilities and build a solid response and recovery plan to deal with network security incidents.
The book will help the reader in these ways:
- How to budget security ?
- how to think like a Security Analyst The reasons why you need an assessment
- The most important parts of the all-critical risk analysis The fundamentals of a security policy Fundamentals of Vulnerability Assessment and Penetration Testing How to design and implement perimeter intrusion detection and prevention systems
- How to implement effective ISMS 0 Information Security Management Systems ? Achieving various compliances like ISO7001
Chapter 1 : Information Security
Chapter 2 : Need Assessment and Risk Analysis
Chapter 3 : Vulnerability Assessment and Penetration Testing
Chapter 4 : Security Policies
Chapter 5 : Electronic Security
Chapter 6 : Data Security
Chapter 7 : Information Security Management Systems
Chapter 8 : Compliances
Chapter 9 :Whitepapers
Glossary