skip to content
Network security evaluation using the NSA IEM Preview this item
ClosePreview this item
Checking...

Network security evaluation using the NSA IEM

Author: Bryan Cunningham; Russ Rogers; United States. National Security Agency.; et al
Publisher: Rockland, Mass. : Syngress Pub., ©2005.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Provides a methodology for conducting technical security evaluations of the critical components of a target network. This book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues. It also offers guidance on the creation of customer roadmaps to better security.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Bryan Cunningham; Russ Rogers; United States. National Security Agency.; et al
ISBN: 0080489435 9780080489438
OCLC Number: 183265831
Notes: Title from title screen.
Description: 1 online resource.
Contents: Cover; Contents; Prologue Why the IEM?; Chapter 1 Introducing the INFOSEC Evaluation Methodology; Chapter 2 Before the Evaluation Starts; Chapter 3 Setting Expectations; Chapter 4 Scoping the Evaluation; Chapter 5 Legal Principles for Information Security Evaluations1; Chapter 6 Building the Technical Evaluation Plan; Chapter 7 Starting Your On-Site Efforts; Chapter 8 Network Discovery Activities; Chapter 9 Collecting the Majority of Vulnerabilities; Chapter 10 Fine-Tuning the Evaluation; Chapter 11 The Onsite Closing Meeting; Chapter 12 Post-Evaluation Analysis
Responsibility: Bryan Cunningham ... [et al.] ; Russ Rogers, technical editor and contributor.

Abstract:

Provides a methodology for conducting technical security evaluations of the critical components of a target network. This book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues. It also offers guidance on the creation of customer roadmaps to better security.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/183265831>
library:oclcnum"183265831"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/183265831>
rdf:typeschema:Book
schema:about
schema:about
<http://id.loc.gov/authorities/subjects/sh85042310>
rdf:typeschema:Intangible
schema:name"Electronic data processing departments--Security measures--Evaluation."@en
schema:about
schema:about
schema:about
schema:author
schema:author
schema:bookFormatschema:EBook
schema:contributor
schema:copyrightYear"2005"
schema:datePublished"2005"
schema:description"Provides a methodology for conducting technical security evaluations of the critical components of a target network. This book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues. It also offers guidance on the creation of customer roadmaps to better security."@en
schema:description"Cover; Contents; Prologue Why the IEM?; Chapter 1 Introducing the INFOSEC Evaluation Methodology; Chapter 2 Before the Evaluation Starts; Chapter 3 Setting Expectations; Chapter 4 Scoping the Evaluation; Chapter 5 Legal Principles for Information Security Evaluations1; Chapter 6 Building the Technical Evaluation Plan; Chapter 7 Starting Your On-Site Efforts; Chapter 8 Network Discovery Activities; Chapter 9 Collecting the Majority of Vulnerabilities; Chapter 10 Fine-Tuning the Evaluation; Chapter 11 The Onsite Closing Meeting; Chapter 12 Post-Evaluation Analysis"@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1039023068>
schema:inLanguage"en"
schema:name"Network security evaluation using the NSA IEM"@en
schema:publisher
schema:url
schema:url<http://www.books24x7.com/marc.asp?bookid=11828>
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.