LEADER 03634nam a2200421Ii 4500 001 991003247019707536 006 m d 007 cr cn||||||||| 008 070806s2003 ne a sb 001 0 eng d 020 $a9781555583064 020 $a1555583067 035 $ab13654871-39ule_inst 037 $a101739:101754$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aRittinghouse, John W.$0627521 245 10$aCybersecurity operations handbook$h[electronic resource] /$cJohn W. Rittinghouse, William M. Hancock. 260 $aAmsterdam ;$aBoston :$bElsevier Digital Press,$cc2003. 300 $axli, 1287 p. :$bill. ;$c26 cm. 504 $aIncludes bibliographical references and index. 505 0 $aWhy worry about Security?; Network Security Management Basics; Security Foundations; Firewalls and Perimeters; VPNs and Remote Access; Intrusion Detection in Depth; Securing Communications; Keys, Signatures, Certificates, and PKI; Hacker Exploits; Incident Handling Basics; Forensics, Investigation, and Response; Security Diligence; Business Continuity Planning; Auditing Fundamentals; Security-Management Issues; Outsourcing and Security; Security Service Level Agreements; Future Trends in Security; Sample Policy Documents -- Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best. 520 $aCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer security. 650 0$aComputer networks$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aHancock, Bill,$d1957- 776 1 $cOriginal$z1555583067$z9781555583064$w(DLC) 2003051481$w(OCoLC)52134814 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781555583064$zAn electronic book accessible through the World Wide Web; click for information 856 42$zPublisher description$uhttp://catdir.loc.gov/catdir/description/els031/2003051481.html 856 41$zTable of contents$uhttp://www.loc.gov/catdir/toc/els031/2003051481.html 907 $a.b13654871$b24-02-22$c24-01-08 912 $a991003247019707536 994 $aC0$bTEF 996 $aCybersecurity operations handbook$91212826 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gne $h0$i0