Information Technology

Security & Auditing

Per Page:

Network Perimeter Security: Building Defense In-Depth

Cliff Riggs
October 27, 2003

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are...

Cyber Terrorism: A Guide for Facility Managers

Joseph F. Gustin
October 15, 2003

Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs. Known terrorist groups are identified, discussed, and their...

Critical Incident Management

Alan B. Sterneckert
September 29, 2003

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they have taken to secure people, information and infrastructure from outside attacks are inefficient or incomplete. Responding to...

The Laws of Software Process: A New Model for the Production and Management of Software

Phillip G. Armour
September 25, 2003

Within one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has....

Managing A Network Vulnerability Assessment

Thomas R. Peltier, Justin Peltier, John A. Blackley
May 28, 2003

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and...

Asset Protection and Security Management Handbook

James Walsh
December 27, 2002

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For...

Using the Common Criteria for IT Security Evaluation

Debra S. Herrmann
December 27, 2002

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC...

Building A Global Information Assurance Program

Raymond J Curts, Douglas E. Campbell
December 26, 2002

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to...

Complete Book of Remote Access: Connectivity and Security

Victor Kasacavage
December 10, 2002

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This...

The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques

Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
June 20, 2002

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their...

UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management

Bozidar Levi
May 29, 2002

To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still more challenges. UNIX Administration: A Comprehensive Sourcebook for Effective Systems &...