Information Technology

Security & Auditing

Per Page:

Using the Common Criteria for IT Security Evaluation

1st Edition

Debra S. Herrmann
December 27, 2002

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC...

Building A Global Information Assurance Program

1st Edition

Raymond J Curts, Douglas E. Campbell
December 26, 2002

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to...

Complete Book of Remote Access: Connectivity and Security

1st Edition

Victor Kasacavage
December 10, 2002

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This...

The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques

1st Edition

Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
June 20, 2002

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their...

UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management

1st Edition

Bozidar Levi
May 29, 2002

To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still more challenges. UNIX Administration: A Comprehensive Sourcebook for Effective Systems &...

Securing and Controlling Cisco Routers

1st Edition

Peter T. Davis
May 15, 2002

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco...

Securing Windows NT/2000: From Policies to Firewalls

1st Edition

Michael A. Simonyi
April 29, 2002

In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical...

The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions

1st Edition

Rebecca Herold
December 20, 2001

Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response...

Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

1st Edition

Thomas R. Peltier
December 20, 2001

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business...

Building an Information Security Awareness Program

1st Edition

Mark B. Desman
October 30, 2001

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't...

A Practical Guide to Security Engineering and Information Assurance

1st Edition

Debra S. Herrmann
October 18, 2001

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and...