skip to content
Cybersecurity operations handbook Preview this item
ClosePreview this item
Checking...

Cybersecurity operations handbook

Author: John W Rittinghouse; Bill Hancock
Publisher: Amsterdam ; Boston : Elsevier Digital Press, ©2003.
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Summary:
"Cybersecurity Operations Handbook is the first book written for daily security operations teams who install, operate and maintain a wide range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset production, integrity management, availability methodology, incident  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: John W Rittinghouse; Bill Hancock
ISBN: 1555583067 9781555583064
OCLC Number: 52134814
Description: xli, 1287 pages : illustrations ; 26 cm
Contents: Why worry about security? --
Network security management basics --
Security foundations --
Firewalls and perimeters --
VPNs and remote access --
Intrusion detection in depth --
Securing communications --
Keys, signatures, certificates, and PKI --
Hacker exploits --
Incident handling basics --
Forensics, investigation, and response --
Security diligence --
Business-continuity planning --
Auditing fundamentals --
Security-management issues --
Outsourcing and security --
Security service level agreements --
Future trends in security --
Sample policy documents.
Responsibility: John W. Rittinghouse, William M. Hancock.
More information:

Abstract:

Suitable for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure, this book provides extensive guidance on various aspects of  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/52134814> # Cybersecurity operations handbook
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "52134814" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/772113#Place/amsterdam> ; # Amsterdam
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/ne> ;
   library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
   schema:about <http://dewey.info/class/005.8/e21/> ;
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/7628140> ; # Bill Hancock
   schema:copyrightYear "2003" ;
   schema:creator <http://viaf.org/viaf/19051716> ; # John W. Rittinghouse
   schema:datePublished "2003" ;
   schema:description "Why worry about security? -- Network security management basics -- Security foundations -- Firewalls and perimeters -- VPNs and remote access -- Intrusion detection in depth -- Securing communications -- Keys, signatures, certificates, and PKI -- Hacker exploits -- Incident handling basics -- Forensics, investigation, and response -- Security diligence -- Business-continuity planning -- Auditing fundamentals -- Security-management issues -- Outsourcing and security -- Security service level agreements -- Future trends in security -- Sample policy documents."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/772113> ;
   schema:inLanguage "en" ;
   schema:name "Cybersecurity operations handbook"@en ;
   schema:productID "52134814" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/52134814#PublicationEvent/amsterdam_boston_elsevier_digital_press_2003> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/772113#Agent/elsevier_digital_press> ; # Elsevier Digital Press
   schema:reviews <http://www.worldcat.org/title/-/oclc/52134814#Review/-1917947105> ;
   schema:url <http://catdir.loc.gov/catdir/toc/els031/2003051481.html> ;
   schema:workExample <http://worldcat.org/isbn/9781555583064> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/52134814> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
   schema:name "Boston" ;
    .

<http://experiment.worldcat.org/entity/work/data/772113#Agent/elsevier_digital_press> # Elsevier Digital Press
    a bgn:Agent ;
   schema:name "Elsevier Digital Press" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/19051716> # John W. Rittinghouse
    a schema:Person ;
   schema:familyName "Rittinghouse" ;
   schema:givenName "John W." ;
   schema:name "John W. Rittinghouse" ;
    .

<http://viaf.org/viaf/7628140> # Bill Hancock
    a schema:Person ;
   schema:birthDate "1957" ;
   schema:familyName "Hancock" ;
   schema:givenName "Bill" ;
   schema:name "Bill Hancock" ;
    .

<http://worldcat.org/isbn/9781555583064>
    a schema:ProductModel ;
   schema:isbn "1555583067" ;
   schema:isbn "9781555583064" ;
    .

<http://www.worldcat.org/title/-/oclc/52134814#Review/-1917947105>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/52134814> ; # Cybersecurity operations handbook
   schema:reviewBody ""Cybersecurity Operations Handbook is the first book written for daily security operations teams who install, operate and maintain a wide range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset production, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. It provides a master document on the FCC Cybersecurity Best Practices for prevention and recovery and provides complete coverage of all critical operational procedures for meeting new Homeland Security requirements."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.