9781597492270

The Best Damn IT Security Management Book Period

by ; ; ; ;
  • ISBN13:

    9781597492270

  • ISBN10:

    1597492272

  • Format: Paperback
  • Copyright: 2007-12-14
  • Publisher: Elsevier Science Ltd

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $66.95 Save up to $16.74
  • Rent Book $60.26
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedakers, this volume is an indispensable addition to a serious security professional's toolkit. Coverage includes Business Continuity, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration. * An all encompassing book, covering general security management issues and providing specific guidelines and checklists. * Anyone studying for a security specific certification or ASIS certification, will find this a valuable resource. * The only book to cover all major IT and security management issues in one place: disaster recover, project management, operations management, risk assessment.

Table of Contents

From Vulnerability to Patchp. 1
Windows of Vulnerabilityp. 3
Vulnerability Assessment 101p. 15
Vulnerability Assessment Toolsp. 37
Vulnerability Assessment: Step Onep. 53
Vulnerability Assessment: Step Twop. 67
Going Furtherp. 81
Vulnerability Managementp. 119
Vulnerability Management Toolsp. 135
Vulnerability and Configuration Managementp. 147
Regulatory Compliancep. 167
Tying It All Togetherp. 181
Network Security Evaluationp. 201
Introducing the INFOSEC Evaluation Methodologyp. 203
Before the Evaluation Startsp. 217
Setting Expectationsp. 239
Scoping the Evaluationp. 257
Legal Principles for Information Security Evaluationsp. 283
Building the Technical Evaluation Planp. 323
Starting Your Onsite Effortsp. 341
Network Discovery Activitiesp. 363
Collecting the Majority of Vulnerabilitiesp. 409
Fine-Tuning the Evaluationp. 443
The Onsite Closing Meetingp. 463
Post-Evaluation Analysisp. 475
Creating Measurements and Trending Resultsp. 493
Trending Metricsp. 513
Final Reportingp. 531
Summing Up the INFOSEC Evaluation Methodologyp. 549
Business Continuity & Disaster Recoveryp. 581
Business Continuity and Disaster Recovery Overviewp. 583
Project Initiationp. 615
Risk Assessmentp. 671
Business Impact Analysisp. 733
Mitigation Strategy Developmentp. 773
Business Continuity/Disaster Recovery Plan Developmentp. 799
Emergency Response and Recoveryp. 829
Training, Testing, and Auditingp. 845
BC/DR Plan Maintenancep. 869
BC/DR Checklistsp. 883
Indexp. 905
Table of Contents provided by Blackwell. All Rights Reserved.

Rewards Program

Write a Review