Cybersecurity operations handbook / John W. Rittinghouse, William M. Hancock.

By: Rittinghouse, John WContributor(s): Hancock, Bill, 1957-Publisher: Amsterdam ; Boston : Elsevier Digital Press, c2003Description: xli, 1287 p. : ill. ; 26 cmSubject(s): Computer networks -- Security measures | Computer securityDDC classification: 005.8,RIT Online resources: Publisher description | Table of contents
Contents:
Why Worry about Security (Page-1), Network Security Management Basics (Page 25), Security Foundations (Page-63), Firewalls and Perimeters (Page-115), VPNS and Remote Access (Page-155), Intrusion Detection in Depth (Page-191), Securing Communications (Page-231), Keys, Signatures, Certificates and PKI (Page-269), Hacker Exploits (Page-293), Incident Handling Basics (Page-323), Forensics, Investigation and Response (Page-365), Security Diligence (Page-427), Business Continuity Planning (Page-441), Auditing fundamentals (Page-457), Security Management issues (Page-493), Outsourcing and Security (Page-525), Security Service level Agreements (Page-581), Future Trends in Security (Page-601),Sample Policy Documents (Page-631),
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
Reference 005.8,RIT (Browse shelf) Link to resource Available Almirah No.18, Shelf No.3 MCS31764
Total holds: 0

Why Worry about Security (Page-1), Network Security Management Basics (Page 25), Security Foundations (Page-63), Firewalls and Perimeters (Page-115), VPNS and Remote Access (Page-155), Intrusion Detection in Depth (Page-191), Securing Communications (Page-231), Keys, Signatures, Certificates and PKI (Page-269), Hacker Exploits (Page-293), Incident Handling Basics (Page-323), Forensics, Investigation and Response (Page-365), Security Diligence (Page-427), Business Continuity Planning (Page-441), Auditing fundamentals (Page-457), Security Management issues (Page-493), Outsourcing and Security (Page-525), Security Service level Agreements (Page-581), Future Trends in Security (Page-601),Sample Policy Documents (Page-631),

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.