Information Security The Complete Reference (2nd Edition) by Mark Rhodes-Ousley

By Mark Rhodes-Ousley

Improve and enforce a good end-to-end safeguard program

Today’s advanced international of cellular structures, cloud computing, and ubiquitous information entry places new defense calls for on each IT specialist. info protection: the full Reference, moment variation (previously titled community defense: the whole Reference) is the single entire publication that gives vendor-neutral info on all elements of data defense, with a watch towards the evolving probability panorama. completely revised and improved to hide all facets of recent info security—from options to details—this version offers a one-stop reference both appropriate to the newbie and the pro professional.

Find out find out how to construct a holistic safeguard software according to confirmed method, hazard research, compliance, and company wishes. You’ll methods to effectively safeguard information, networks, desktops, and purposes. In-depth chapters conceal info security, encryption, details rights administration, community safety, intrusion detection and prevention, Unix and home windows protection, digital and cloud safeguard, safe software improvement, catastrophe restoration, forensics, and real-world assaults and countermeasures. incorporated is an intensive safety word list, in addition to standards-based references. this can be a nice source for execs and scholars alike.

Understand safety techniques and construction blocks
Identify vulnerabilities and mitigate risk
Optimize authentication and authorization
Use IRM and encryption to guard unstructured data
Defend garage units, databases, and software
Protect community routers, switches, and firewalls
Secure VPN, instant, VoIP, and PBX infrastructure
Design intrusion detection and prevention systems
Develop safe home windows, Java, and cellular applications
Perform incident reaction and forensic research

Show description

Read Online or Download Information Security The Complete Reference (2nd Edition) PDF

Similar security books

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Each person wishes privateness and safeguard on-line, anything that the majority desktop clients have roughly given up on so far as their own information is anxious. there's no scarcity of fine encryption software program, and no scarcity of books, articles and essays that purport to be approximately the way to use it. but there's priceless little for traditional clients who wish barely enough information regarding encryption to take advantage of it accurately and securely and appropriately--WITHOUT having to develop into specialists in cryptography.

Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

This is often an exam of "Comprehensive protection" as a coverage that is going past the necessities of army defence opposed to a selected "enemy" to emphasize the necessity to take into consideration different facets important to nationwide balance: meals, strength, atmosphere, conversation and social safety.

Protecting Human Security in Africa

Maintaining Human safeguard in Africa discusses the most effective threats to human safety in Africa. It offers specially with these threats to the protection of African humans that are least understood or explored. In subject matters various from corruption, the proliferation of small palms and lightweight guns, nutrition protection, the devastation of inner displacement in Africa, the hyperlink among traditional assets and human defense, to the issues of pressured labour, threatsto women's protection, and environmental protection, the e-book examines the criminal and coverage demanding situations of shielding human protection in Africa.

Additional info for Information Security The Complete Reference (2nd Edition)

Example text

Indd 14 3/14/13 3:37 PM CompRef_2010 / Information Security: The Complete Reference / Rhodes / 435-7 Information Security Overview Security Program Charter Policies Risk Analysis Roadmap Procedures Policy Enforcement Resourcing Plan Standards Gap Analysis Architecture Maintenance and Support Training and Awareness Guidelines Remediation Plans Projects Incident Response Ongoing Guidance Framework Assessment Planning Action Maintenance Authority 15 Part I Chapter 1 Figure 1-5 Security program components is responsible for information protection, risk management, monitoring, and response.

765 Incident Response and Forensic Analysis . . . . . . . . . . . . 767 Incident Response . . . . . . . . . . . . . . . . . . . . . . 767 Incident Detection . . . . . . . . . . . . . . . . . . . 768 Response and Containment . . . . . . . . . . . . . . . . 768 Recovery and Resumption . . . . . . . . . . . . . . . . 770 Review and Improvement . . . . . . . . .

708 Securing Web Services and Web Applications . . . . . . . . 708 Summary . . . . . . . . . . . . . . . . . . . . . . . . . 712 References . . . . . . . . . . . . . . . . . . . . . . . . . 712 Controlling Application Behavior . . . . . . . . . . . . . . . 713 Controlling Applications on the Network . . . . . . . . . . . . 713 Access Control Challenges . . . . . . . . . . . . . . . . 714 Application Visibility .

Download PDF sample

Rated 5.00 of 5 – based on 5 votes