Skip to main content

Surviving security how to integrate people, process, and technology

Andress, Amanda2003
Book
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. This book fills this void by explaining security via a holistic approach that considers both the overall security infrastructure and the roles of each individual component. It provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access.
Edition:
2nd ed.
Imprint:
Boca Raton, FL : Auerbach Publications, 2003.
Notes:
Includes bibliographical references (p. 481-482) and index.Description based on print version record.
Contents:
Why do I need security? -- Understanding requirements and risk -- Security policies and procedures -- Cryptography and encryption -- Authentication -- Network architecture and physical security -- Firewalls and perimeter security -- Network management and device security -- Wireless network security -- Intrusion detection -- Remote access -- Host security -- Server security -- Client security -- Application development -- Security maintenance and monitoring -- Vulnerability testing -- Security audits -- Incident response -- Integrating people, process, and technology -- Trends to watch.
ISBN:
97808493204220849320429
LC class:
QA76.9.A25QA76.9 AND
Language:
English
BRN:
17911
Clear current selections
items currently selected
View my active saved list
0 items in my active saved list