Cybersecurity operations handbook /

Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily opera...

Full description

Saved in:
Bibliographic Details
Main Authors: Rittinghouse, John W. (Author)
Corporate Authors: Elsevier Science & Technology.
Group Author: Hancock, Bill, 1957-
Published: Elsevier Digital Press,
Publisher Address: Amsterdam ; Boston :
Publication Dates: 2003.
Literature type: eBook
Language: English
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781555583064
Summary: Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security.
Carrier Form: 1 online resource (xli, 1287 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9781555583064
1555583067
9780080530185
0080530184
Index Number: QA76
CLC: TP309
Contents: Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents.