|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISALENTO991003250319707536 |
|
|
Titolo |
Network security evaluation using the NSA IEM [electronic resource] / Russ Rogers, technical editor and contributor ; Bryan Cunningham ... [et al.]. |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA : Syngress |
|
[Sebastopol, Calif.] : Distributed by O'Reilly Media in the United States and Canada, c2005 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
xxvi, 437 p. : ill. ; 24 cm. |
|
|
|
|
|
|
Altri autori (Persone) |
|
Rogers, Russ.author |
Cunningham, Bryan |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures - Evaluation |
Computer security - Evaluation |
Information resources management - Evaluation |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Risorsa elettronica |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Security Horizon." |
Includes index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed |
|
|
|
|