Principles of Incident Response and Disaster Recovery

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781111138059
Release Date: 2013-04-19
Genre: Computers

PRINCIPLES OF INCIDENT RESPONSE & DISASTER RECOVERY, 2nd Edition presents methods to identify vulnerabilities within computer networks and the countermeasures that mitigate risks and damage. From market-leading content on contingency planning, to effective techniques that minimize downtime in an emergency, to curbing losses after a breach, this text is the resource needed in case of a network intrusion. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Principles of Information Security

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781337102063
Release Date: 2017-05-24
Genre: Computers

Master the latest technology and developments from the field with the book specifically oriented to the needs of those learning information systems -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just the technical control perspective. Readers gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. The book highlights terms used in the field and a history of the discipline as readers learn how to manage an information security program. This edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Management of Information Security

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781305501256
Release Date: 2016-03-22
Genre: Computers

Readers discover a managerially-focused overview of information security with a thorough treatment of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Information throughout helps readers become information security management practitioners able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. Current and future professional managers complete this book with the exceptional blend of skills and experiences to develop and manage the more secure computing environments that today’s organizations need. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the important foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Roadmap to Information Security For IT and Infosec Managers

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781435480308
Release Date: 2012-08-01
Genre: Computers

ROADMAP TO INFORMATION SECURITY: FOR IT AND INFOSEC MANAGERS provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on assessing and improving an organization's security. The content helps IT managers to handle an assignment to an information security role in ways that conform to expectations and requirements, while supporting the goals of the manager in building and maintaining a solid information security program. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Hands On Information Security Lab Manual

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781285167572
Release Date: 2014-02-24
Genre: Computers

HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, helps you hone essential information security skills by applying your knowledge to detailed, realistic exercises using Microsoft Windows 2000, Windows XP, Windows 7, and Linux. This wide-ranging, non-certification-based lab manual includes coverage of scanning, OS vulnerability analysis and resolution, firewalls, security maintenance, forensics, and more. The Fourth Edition includes new introductory labs focused on virtualization techniques and images, giving you valuable experience with some of the most important trends and practices in information security and networking today. All software necessary to complete the labs are available online as a free download. An ideal resource for introductory, technical, and managerial courses or self-study, this versatile manual is a perfect supplement to the PRINCIPLES OF INFORMATION SECURITY, SECURITY FUNDAMENTALS, and MANAGEMENT OF INFORMATION SECURITY books. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Hacking mit Security Onion

Author: Chris Sanders
Publisher: Franzis Verlag
ISBN: 9783645204965
Release Date: 2016-09-12
Genre: Computers

Sie können noch so viel in Hardware, Software und Abwehrmechanismen investieren, absolute Sicherheit für Ihre IT-Infrastruktur wird es nicht geben. Wenn Hacker sich wirklich anstrengen, werden sie auch in Ihr System gelangen. Sollte das geschehen, müssen Sie sowohl technisch als auch organisatorisch so aufgestellt sein, dass Sie die Gegenwart eines Hackers erkennen und darauf reagieren können. Sie müssen in der Lage sein, einen Zwischenfall zu deklarieren und die Angreifer aus Ihrem Netzwerk zu vertreiben, bevor sie erheblichen Schaden anrichten. Das ist Network Security Monitoring (NSM). Lernen Sie von dem leitenden Sicherheitsanalytiker Sanders die Feinheiten des Network Security Monitoring kennen. Konzepte verstehen und Network Security Monitoring mit Open-Source-Tools durchführen: Lernen Sie die drei NSM-Phasen kennen, um diese in der Praxis anzuwenden. Die praktische Umsetzung der NSM erfolgt mit vielen Open-Source-Werkzeugen wie z. B. Bro, Daemonlogger, Dumpcap, Justniffer, Honeyd, Httpry, Netsniff-NG, Sguil, SiLK, Snorby Snort, Squert, Suricata, TShark und Wireshark. Anhand von ausführlichen Beispielen lernen Sie, die Tools effizient in Ihrem Netzwerk einzusetzen.

Auditing Cloud Computing

Author: Ben Halpert
Publisher: John Wiley & Sons
ISBN: 9781118116043
Release Date: 2011-07-05
Genre: Business & Economics

The auditor's guide to ensuring correct security and privacypractices in a cloud computing environment Many organizations are reporting or projecting a significantcost savings through the use of cloud computing—utilizingshared computing resources to provide ubiquitous access fororganizations and end users. Just as many organizations, however,are expressing concern with security and privacy issues for theirorganization's data in the "cloud." Auditing Cloud Computingprovides necessary guidance to build a proper audit to ensureoperational integrity and customer data protection, among otheraspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address securityand privacy aspects that through a proper audit can provide aspecified level of assurance for an organization's resources Reveals effective methods for evaluating the security andprivacy practices of cloud services A cloud computing reference for auditors and IT securityprofessionals, as well as those preparing for certificationcredentials, such as Certified Information Systems Auditor(CISA) Timely and practical, Auditing Cloud Computing expertlyprovides information to assist in preparing for an audit addressingcloud computing security and privacy for both businesses and cloudbased service providers.

Readings Cases in Information Security Law Ethics

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781133168645
Release Date: 2010-06-23
Genre: Computers

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text, this resource offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Guide to Network Security

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9780840024220
Release Date: 2012-09-20
Genre: Computers

GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for students who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Guide to Firewalls and VPNs

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781111135393
Release Date: 2012-12-20
Genre: Computers

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving students the opportunity to hone and apply the knowledge and skills they will need as working professionals. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Hacken f r Dummies

Author: Kevin Beaver
Publisher: John Wiley & Sons
ISBN: 9783527805006
Release Date: 2016-11-10
Genre: Computers

Fürchten Sie um Ihre Unternehmensdaten? Machen Sie sich Sorgen um Ihre IT-Systeme, wenn Sie wieder einmal lesen, dass unbekannte Hacker ein Unternehmen für Wochen lahmgelegt haben? Warten Sie nicht ab, bis es auch in Ihren Systemen passiert, sondern tun Sie etwas! Dabei hilft Ihnen dieses Buch. Versetzen Sie sich als erstes in die Rolle des Schurken und lernen Sie zu denken wie ein Krimineller! Wo sind die Hürden am niedrigsten? Welche grundlegenden Hackertechniken gibt es? Kevin Beaver zeigt Ihnen, wo Ihre Systeme verwundbar sein könnten, sodass Sie im Rennen um die IT-Sicherheit die Nase vorn behalten.

Principles of Information Security Loose Leaf Version

Author: Michael E. Whitman
Publisher:
ISBN: 1337685755
Release Date: 2017-06-26
Genre: Computers

Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.

Versicherungs konomie

Author: Peter Zweifel
Publisher: Springer-Verlag
ISBN: 9783662107843
Release Date: 2013-07-01
Genre: Business & Economics

Das Buch macht den Leser mit den zentralen Fragestellungen und dem analytischen Werkzeug der Versicherungsökonomik vertraut. Es führt Beiträge zur Nachfrage nach Versicherung, zum Angebot an Versicherung und der Versicherungsregulierung sowie zur Sozialversicherung in einer vereinheitlichten Darstellung zusammen, die bisher nur verstreut in Zeitschriften und Sammelbänden verfügbar waren. Es werden empirisch überprüfbare Voraussagen der Theorie abgeleitet und den Ergebnissen internationaler empirischer Forschung gegenübergestellt. Ausformulierte Folgerungen fassen den Stoff zusammen und erleichtern die Kontrolle des Wissensstands.

Bel Canto

Author: Ann Patchett
Publisher: Piper Schicksalsvoll
ISBN: 9783492983006
Release Date: 2016-10-04
Genre: Fiction

Der Champagner fließt, die wundervolle Stimme einer Weltklasse Sopranistin erfüllt den Palazzo – die politische Elite feiert ausgelassen. Plötzlich fallen Schüsse. Eine Bande von Terroristen stürmt den Raum und nimmt die ganze Gesellschaft in Geiselhaft. Es gibt keinen Ausweg. Und noch ahnt niemand, was die verzaubernde, einende Kraft der Musik in dieser lebensbedrohlichen Situation auszurichten vermag.