03634nam a2200421Ii 4500991003247019707536m d cr cn|||||||||070806s2003 ne a sb 001 0 eng d97815555830641555583067b13654871-39ule_inst101739:101754Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA005.822Rittinghouse, John W.627521Cybersecurity operations handbook[electronic resource] /John W. Rittinghouse, William M. Hancock.Amsterdam ;Boston :Elsevier Digital Press,c2003.xli, 1287 p. :ill. ;26 cm.Includes bibliographical references and index.Why worry about Security?; Network Security Management Basics; Security Foundations; Firewalls and Perimeters; VPNs and Remote Access; Intrusion Detection in Depth; Securing Communications; Keys, Signatures, Certificates, and PKI; Hacker Exploits; Incident Handling Basics; Forensics, Investigation, and Response; Security Diligence; Business Continuity Planning; Auditing Fundamentals; Security-Management Issues; Outsourcing and Security; Security Service Level Agreements; Future Trends in Security; Sample Policy Documents -- Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best.Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer security.Computer networksSecurity measures.Electronic books.localHancock, Bill,1957-Original15555830679781555583064(DLC) 2003051481(OCoLC)52134814Referexhttp://www.sciencedirect.com/science/book/9781555583064An electronic book accessible through the World Wide Web; click for informationPublisher descriptionhttp://catdir.loc.gov/catdir/description/els031/2003051481.htmlTable of contentshttp://www.loc.gov/catdir/toc/els031/2003051481.html.b1365487124-02-2224-01-08991003247019707536C0TEFCybersecurity operations handbook1212826UNISALENTOle02924-01-08mm -engne 00