Surviving security how to integrate people, process, and technology
Andress, Amanda2003
Book
Total copies: 2
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. This book fills this void by explaining security via a holistic approach that considers both the overall security infrastructure and the roles of each individual component. It provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access.
Surviving security how to integrate people, process, and technology / Amanda Andress.
2nd ed.
Boca Raton, FL : Auerbach Publications, 2003.
Includes bibliographical references (p. 481-482) and index.Description based on print version record.
Why do I need security? -- Understanding requirements and risk -- Security policies and procedures -- Cryptography and encryption -- Authentication -- Network architecture and physical security -- Firewalls and perimeter security -- Network management and device security -- Wireless network security -- Intrusion detection -- Remote access -- Host security -- Server security -- Client security -- Application development -- Security maintenance and monitoring -- Vulnerability testing -- Security audits -- Incident response -- Integrating people, process, and technology -- Trends to watch.
97808493204220849320429
QA76.9.A25QA76.9 AND
English
17911