Mission-critical security planner : when hackers won't take no for an answer / Eric Greenberg.
Publication details: Indianapolis, Indiana : Wiley Publishing, Inc., c2003.Description: xvi, 416 p. : ill. ; 24 cmISBN:- 9780471211655
- 0471211656
- 005.8 21 GRE
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 005.8 GRE 1 (Browse shelf(Opens below)) | 1 | Available | BUML23112229 |
Contents;
Chapter Setting the stage for successful security planning
Not an absolute science
A way of thinking
Avoiding the pitfalls
Identifying risk
Selling security
etc.
Chapter 2: A security plan that works
Forming a security planning team
Anatomy of an effective security plan
Security life cycle
Creating order from chaos: The stack
etc.
Chapter 3: Using the security plan worksheets: The fundamentals
From here to security
Filling in the fundamental security element worksheets
Authentication
Encryption
Integrity
etc.
Chapter 4: Using the security plan worksheets: The remaining core and wrap-up elements
Organization of the worksheets
Addressing, protocol space, routing plan, filtering, and disablement
Configuration management
Context and executable management
etc.
Chapter 5: Strategic security planning with PKI
PKI primer
Making a business case for PKI
PKI services
PKI business integration
etc.
Chapter 6: Ahead of the hacker: Best practices and a view of the future
Practice makes perfect - Or at least more secure
Into the future: The top 10 methods of attack
Inclosing
Bibliographical references : p. 375-378 . _ Glossary : p. 379-399 . _ Index : p. 401-416.
There are no comments on this title.