skip to content
The best damn IT security management book period Preview this item
ClosePreview this item
Checking...

The best damn IT security management book period

Author: Bryan Cunningham, JD.
Publisher: Burlington, Mass. : Syngress ; Oxford : Elsevier Science [distributor], ©2007.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:

Covers management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries, this volume includes topics such as: Business Continuity,  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Bryan Cunningham, JD.
ISBN: 9781597492270 1597492272
OCLC Number: 170922390
Description: xliii, 913 pages : illustrations ; 24 cm
Contents: pt. 1. From Vulnerability to Patch --
Ch. 1. Windows of Vulnerability --
Ch. 2. Vulnerability Assessment 101 --
Ch. 3. Vulnerability Assessment Tools --
Ch. 4. Vulnerability Assessment: Step One --
Ch. 5. Vulnerability Assessment: Step Two --
Ch. 6. Going Further --
Ch. 7. Vulnerability Management --
Ch. 8. Vulnerability Management Tools --
Ch. 9. Vulnerability and Configuration Management --
Ch. 10. Regulatory Compliance --
Ch. 11. Tying It All Together --
pt. 2. Network Security Evaluation --
Ch. 12. Introducing the INFOSEC Evaluation Methodology --
Ch. 13. Before the Evaluation Starts --
Ch. 14. Setting Expectations --
Ch. 15. Scoping the Evaluation --
Ch. 16. Legal Principles for Information Security Evaluations --
Ch. 17. Building the Technical Evaluation Plan --
Ch. 18. Starting Your Onsite Efforts --
Ch. 19. Network Discovery Activities --
Ch. 20. Collecting the Majority of Vulnerabilities --
Ch. 21. Fine-Tuning the Evaluation --
Ch. 22. Onsite Closing Meeting --
Ch. 23. Post-Evaluation Analysis --
Ch. 24. Creating Measurements and Trending Results --
Ch. 25. Trending Metrics --
Ch. 26. Final Reporting --
Ch. 27. Summing Up the INFOSEC Evaluation Methodology --
pt. 3. Business Continuity & Disaster Recovery --
Ch. 28. Business Continuity and Disaster Recovery Overview --
Ch. 29. Project Initiation --
Ch. 30. Risk Assessment --
Ch. 31. Business Impact Analysis --
Ch. 32. Mitigation Strategy Development --
Ch. 33. Business Continuity/Disaster Recovery Plan Development --
Ch. 34. Emergency Response and Recovery --
Ch. 35. Training, Testing, and Auditing --
Ch. 36. BC/DR Plan Maintenance --
Ch. 37. BC/DR Checklists.
Responsibility: Bryan Cunningham [and others].

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/170922390> # The best damn IT security management book period
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "170922390" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1106193839#Place/oxford> ; # Oxford
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1106193839#Place/burlington_mass> ; # Burlington, Mass.
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh2009121243> ; # Computer security--Management
    schema:about <http://id.worldcat.org/fast/872493> ; # Computer security--Management
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/61286367> ; # JD. Bryan Cunningham
    schema:copyrightYear "2007" ;
    schema:datePublished "2007" ;
    schema:description "pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability Assessment 101 -- Ch. 3. Vulnerability Assessment Tools -- Ch. 4. Vulnerability Assessment: Step One -- Ch. 5. Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7. Vulnerability Management -- Ch. 8. Vulnerability Management Tools -- Ch. 9. Vulnerability and Configuration Management -- Ch. 10. Regulatory Compliance -- Ch. 11. Tying It All Together -- pt. 2. Network Security Evaluation -- Ch. 12. Introducing the INFOSEC Evaluation Methodology -- Ch. 13. Before the Evaluation Starts -- Ch. 14. Setting Expectations -- Ch. 15. Scoping the Evaluation -- Ch. 16. Legal Principles for Information Security Evaluations -- Ch. 17. Building the Technical Evaluation Plan -- Ch. 18. Starting Your Onsite Efforts -- Ch. 19. Network Discovery Activities -- Ch. 20. Collecting the Majority of Vulnerabilities -- Ch. 21. Fine-Tuning the Evaluation -- Ch. 22. Onsite Closing Meeting -- Ch. 23. Post-Evaluation Analysis -- Ch. 24. Creating Measurements and Trending Results -- Ch. 25. Trending Metrics -- Ch. 26. Final Reporting -- Ch. 27. Summing Up the INFOSEC Evaluation Methodology -- pt. 3. Business Continuity & Disaster Recovery -- Ch. 28. Business Continuity and Disaster Recovery Overview -- Ch. 29. Project Initiation -- Ch. 30. Risk Assessment -- Ch. 31. Business Impact Analysis -- Ch. 32. Mitigation Strategy Development -- Ch. 33. Business Continuity/Disaster Recovery Plan Development -- Ch. 34. Emergency Response and Recovery -- Ch. 35. Training, Testing, and Auditing -- Ch. 36. BC/DR Plan Maintenance -- Ch. 37. BC/DR Checklists."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1106193839> ;
    schema:inLanguage "en" ;
    schema:name "The best damn IT security management book period"@en ;
    schema:productID "170922390" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/170922390#PublicationEvent/burlington_mass_syngress_oxford_elsevier_science_distributor_2007> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1106193839#Agent/syngress> ; # Syngress
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1106193839#Agent/elsevier_science_distributor> ; # Elsevier Science [distributor]
    schema:workExample <http://worldcat.org/isbn/9781597492270> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA7A0421> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA809692> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/170922390> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1106193839#Agent/elsevier_science_distributor> # Elsevier Science [distributor]
    a bgn:Agent ;
    schema:name "Elsevier Science [distributor]" ;
    .

<http://experiment.worldcat.org/entity/work/data/1106193839#Place/burlington_mass> # Burlington, Mass.
    a schema:Place ;
    schema:name "Burlington, Mass." ;
    .

<http://id.loc.gov/authorities/subjects/sh2009121243> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://id.worldcat.org/fast/872493> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://viaf.org/viaf/61286367> # JD. Bryan Cunningham
    a schema:Person ;
    schema:familyName "Cunningham" ;
    schema:givenName "Bryan" ;
    schema:name "JD. Bryan Cunningham" ;
    .

<http://worldcat.org/isbn/9781597492270>
    a schema:ProductModel ;
    schema:isbn "1597492272" ;
    schema:isbn "9781597492270" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.