skip to content
Network security evaluation using the NSA IEM Preview this item
ClosePreview this item
Checking...

Network security evaluation using the NSA IEM

Author: Russ Rogers; Bryan Cunningham, JD.
Publisher: Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media in the United States and Canada, ©2005.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed information is given in later chapters about the core technical processes  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Network security evaluation using the NSA IEM.
Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media in the United States and Canada, ©2005
(OCoLC)61669715
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Russ Rogers; Bryan Cunningham, JD.
ISBN: 1423754263 9781423754268 9781597490351 1597490350 0080489435 9780080489438
OCLC Number: 64185938
Notes: "Security Horizon."
Includes index.
Description: 1 online resource (xxvi, 437 pages) : illustrations
Contents: Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout.
Other Titles: Network security evaluation using the National Security Agency INFOSEC evaluation methodology
Network security evaluation
Responsibility: Russ Rogers, technical editor and contributor ; Bryan Cunningham [and others].

Abstract:

Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. This book describes how the methodology evolved  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/64185938> # Network security evaluation using the NSA IEM
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "64185938" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1039023068#Place/sebastopol_calif> ; # Sebastopol, Calif.
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1039023068#Place/rockland_ma> ; # Rockland, MA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1039023068#Topic/information_resources_management_evaluation> ; # Information resources management--Evaluation
    schema:about <http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computer_security_evaluation> ; # Computer security--Evaluation
    schema:about <http://id.worldcat.org/fast/972608> ; # Information resources management--Evaluation
    schema:about <http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://id.worldcat.org/fast/872488> ; # Computer security--Evaluation
    schema:about <http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computer_networks_security_measures_evaluation> ; # Computer networks--Security measures--Evaluation
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:alternateName "Network security evaluation" ;
    schema:alternateName "Network security evaluation using the National Security Agency INFOSEC evaluation methodology" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/61286367> ; # JD. Bryan Cunningham
    schema:contributor <http://viaf.org/viaf/56318045> ; # Russ Rogers
    schema:copyrightYear "2005" ;
    schema:datePublished "2005" ;
    schema:description "Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout."@en ;
    schema:description "Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed information is given in later chapters about the core technical processes that need to occur to ensure a comprehensive understanding of the networks security posture. Ten baseline areas for evaluation are covered in detail. The tools and examples detailed within this book include both Freeware and Commercial tools that provide a detailed analysis of security vulnerabilities on the target network. The book ends with guidance on the creation of customer roadmaps to better security and recommendations on the format and delivery of the final report. * There is no other book currently on the market that covers the National Security Agency's recommended methodology for conducting technical security evaluations * The authors are well known in the industry for their work in developing and deploying network security evaluations using the NSA IEM * The authors also developed the NSA's training class on this methodology."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1039023068> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/61669715> ;
    schema:name "Network security evaluation using the NSA IEM"@en ;
    schema:productID "64185938" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/64185938#PublicationEvent/rockland_ma_syngress_sebastopol_calif_distributed_by_o_reilly_media_in_the_united_states_and_canada_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1039023068#Agent/syngress> ; # Syngress
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1039023068#Agent/distributed_by_o_reilly_media_in_the_united_states_and_canada> ; # Distributed by O'Reilly Media in the United States and Canada
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149581> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597490351> ;
    schema:url <http://swbplus.bsz-bw.de/bsz405313187cov.htm> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=11828> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490351> ;
    schema:workExample <http://worldcat.org/isbn/9780080489438> ;
    schema:workExample <http://worldcat.org/isbn/9781423754268> ;
    schema:workExample <http://worldcat.org/isbn/9781597490351> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/64185938> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1039023068#Agent/distributed_by_o_reilly_media_in_the_united_states_and_canada> # Distributed by O'Reilly Media in the United States and Canada
    a bgn:Agent ;
    schema:name "Distributed by O'Reilly Media in the United States and Canada" ;
    .

<http://experiment.worldcat.org/entity/work/data/1039023068#Place/sebastopol_calif> # Sebastopol, Calif.
    a schema:Place ;
    schema:name "Sebastopol, Calif." ;
    .

<http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computer_networks_security_measures_evaluation> # Computer networks--Security measures--Evaluation
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh94001277> ;
    schema:name "Computer networks--Security measures--Evaluation"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039023068#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039023068#Topic/information_resources_management_evaluation> # Information resources management--Evaluation
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh85066147> ;
    schema:name "Information resources management--Evaluation"@en ;
    .

<http://id.worldcat.org/fast/872488> # Computer security--Evaluation
    a schema:Intangible ;
    schema:name "Computer security--Evaluation"@en ;
    .

<http://id.worldcat.org/fast/972608> # Information resources management--Evaluation
    a schema:Intangible ;
    schema:name "Information resources management--Evaluation"@en ;
    .

<http://viaf.org/viaf/56318045> # Russ Rogers
    a schema:Person ;
    schema:familyName "Rogers" ;
    schema:givenName "Russ" ;
    schema:name "Russ Rogers" ;
    .

<http://viaf.org/viaf/61286367> # JD. Bryan Cunningham
    a schema:Person ;
    schema:familyName "Cunningham" ;
    schema:givenName "Bryan" ;
    schema:name "JD. Bryan Cunningham" ;
    .

<http://worldcat.org/isbn/9780080489438>
    a schema:ProductModel ;
    schema:isbn "0080489435" ;
    schema:isbn "9780080489438" ;
    .

<http://worldcat.org/isbn/9781423754268>
    a schema:ProductModel ;
    schema:isbn "1423754263" ;
    schema:isbn "9781423754268" ;
    .

<http://worldcat.org/isbn/9781597490351>
    a schema:ProductModel ;
    schema:isbn "1597490350" ;
    schema:isbn "9781597490351" ;
    .

<http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490351>
    rdfs:comment "An electronic book accessible through the World Wide Web; click for information" ;
    .

<http://www.worldcat.org/oclc/61669715>
    a schema:CreativeWork ;
    rdfs:label "Network security evaluation using the NSA IEM." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/64185938> ; # Network security evaluation using the NSA IEM
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.