BN.com Gift Guide

Surving Security: How to Integrate People, Process, and Technology / Edition 2

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Hardcover)
  • All (9) from $1.99   
  • New (2) from $87.14   
  • Used (7) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$87.14
Seller since 2008

Feedback rating:

(4533)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New Book. Shipped from UK within 4 to 14 business days. Established seller since 2000.

Ships from: Horcott Rd, Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$100.23
Seller since 2008

Feedback rating:

(17860)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions.

About the Author
Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.

Read More Show Less

Product Details

  • ISBN-13: 9780849320422
  • Publisher: Taylor & Francis
  • Publication date: 11/1/2003
  • Edition description: New Edition
  • Edition number: 2
  • Pages: 528
  • Product dimensions: 6.30 (w) x 9.30 (h) x 1.30 (d)

Table of Contents

WHY DO I NEED SECURITY?
Introduction
The Importance of an Effective Security Infrastructure
People, Process, and Technology
What Are You Protecting Against?
Types of Attacks
Types of Attackers
Security as a Competitive Advantage
Choosing a Solution
Finding Security Employees
The Layered Approach

UNDERSTANDING REQUIREMENTS AND RISK
What Is Risk?
Embracing Risk
Information Security Risk Assessment
Assessing Risk
Insurance

SECURITY POLICIES AND PROCEDURES
Internal Focus Is Key
Security Awareness and Education
Policy Life Cycle
Developing Policies
Components of a Security Policy
Sample Security Policies
Procedures

CRYPTOGRAPHY AND ENCRYPTION
A Brief History of Cryptography
Cryptography Today
Hash Algorithms
Digital Signatures
e-Signature Law
Digital Certificates
Public-Key Infrastructure (PKI)
Secure Sockets Layer (SSL)
Other Protocols and Standards
Pretty Good Privacy (PGP)
Steganography
Other Uses of Encryption

AUTHENTICATION
Multifactor Authentication
Methods of Authentication
Single Sign-On
Centralized Administration Remains Elusive

NETWORK ARCHITECTURE AND PHYSICAL SECURITY
Changing Network Architecture
Common Configurations
Anson Inc.'s Architecture
Internal Architecture
Virtual Local Area Networks
Physical Security
Choosing a Location
Policies and Procedures

FIREWALLS AND PERIMETER SECURITY
Firewall Advances
Firewall Technologies
Firewall Features
The Best Firewall for You
Hardware Appliance vs. Software
In-House vs. Outsource
Firewall Architectures
Which Architecture Will Work for You?
Configuring Your Firewall
Firewall Rules
Content Filtering
Logging
A Good Start

NETWORK MANAGEMENT AND DEVICE SECURITY
Networks, Networks Everywhere
Denial of Service
Reflected Attacks
Defending Your Network
Identifying Compromised Systems
SNMP
SNMP Security
Identifying New Devices on the Network
Secure Device Configuration
General Steps for All Network Devices

WIRELESS NETWORK SECURITY
Standards
Security Issues
Authentication Solutions
Auditing Wireless LANs

INTRUSION DETECTION
What Are Intrusion-Detection Systems?
Categories of Intrusion Analysis
Characteristics of a Good IDS
Errors
Categories of Intrusion Detection
Separating the Truth from the Hype
Network Architecture with Intrusion Detection
Managed Services
Problems with Intrusion Detection
Technologies Under Development

REMOTE ACCESS
Remote-Access Users
Remote-Access Requirements
Issues with Remote Access
Policies
Technologies
Deploying and Supporting Remote Access
End-User Security

HOST SECURITY
Implementing Host Security
Understanding System Functions
Operating System Hardening
Security-Monitoring Programs
System Auditing

SERVER SECURITY
Hardening vs. Server Security
Firewalls
Web Servers
E-Mail Servers
Databases
DNS Servers
DNSSEC
Domain Controllers and Active Directory
Appliances
E-Mail Security
Policy Management
Policy Control

CLIENT SECURITY
Locking Down Systems
Protecting against Viruses
Protecting against Malware
Microsoft Applications
Instant Messaging

APPLICATION DEVELOPMENT
Identifying Threats
Web-Application Security
Prevention 334
Technology Tools and Solutions

SECURITY MAINTENANCE AND MONITORING
Security Is an Ongoing Process
Patches
Monitor Mailing Lists
Review Logs
Periodically Review Configurations
Managed Security Services

VULNERABILITY TESTING
How Does the Assessment Work?
When Are Vulnerability Assessments Needed?
Why Assess Vulnerability?
Performing Assessments
Password Cracking
Common Attacks

SECURITY AUDITS
Audit Overview
The Audit
Types of Audits
Analysis of an Audit
Surviving an Audit
The Cost of an Audit
Sample Audit Checklist

INCIDENT RESPONSE
Understanding Incident Management
The Importance of CSIR Teams
Justifying a Response Team
Cost of an Incident
Assessing Your Needs
How to Use Your Assessment
Building an Incident Response Plan of Attack
When an Incident Occurs
The SANS Institute's Incident-Response Plan
Analyzing an Attack

INTEGRATING PEOPLE, PROCESS, AND TECHNOLOGY
Your Security Infrastructure
Maintaining a Successful Security Infrastructure
Security-Awareness Training
Who Are We?
What Are Our Responsibilities?
What are Your (the employee's) Responsibilities?
Security ROI
Security Infrastructure Components
Interoperability and Management
Security Infrastructure Myths

TRENDS TO WATCH
PDAs
Peer-to-Peer Networks
Honeypots
Storage-Area Networks
The Rewards Are Yours

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)