LEADER 03970cam a2200445Ii 4500 001 991003250319707536 006 m d 007 cr cn||||||||| 008 070806s2005 mau s 001 0 eng d 020 $a9781597490351 020 $a1597490350 035 $ab13655504-39ule_inst 037 $a115845:115943$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aNetwork security evaluation using the NSA IEM$h[electronic resource] /$cRuss Rogers, technical editor and contributor ; Bryan Cunningham ... [et al.]. 246 3 $aNetwork security evaluation using the National Security Agency INFOSEC evaluation methodology 246 18$aNetwork security evaluation 260 $aRockland, MA :$bSyngress ;$a[Sebastopol, Calif.] :$bDistributed by O'Reilly Media in the United States and Canada,$cc2005. 300 $axxvi, 437 p. :$bill. ;$c24 cm. 500 $a"Security Horizon." 500 $aIncludes index. 505 0 $aIntroduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout. 520 $aNetwork Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed information is given in later chapters about the core technical processes that need to occur to ensure a comprehensive understanding of the networks security posture. Ten baseline areas for evaluation are covered in detail. The tools and examples detailed within this book include both Freeware and Commercial tools that provide a detailed analysis of security vulnerabilities on the target network. The book ends with guidance on the creation of customer roadmaps to better security and recommendations on the format and delivery of the final report. * There is no other book currently on the market that covers the National Security Agency's recommended methodology for conducting technical security evaluations * The authors are well known in the industry for their work in developing and deploying network security evaluations using the NSA IEM * The authors also developed the NSA's training class on this methodology. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures$xEvaluation. 650 0$aComputer security$xEvaluation. 650 0$aInformation resources management$xEvaluation. 655 7$aElectronic books.$2local 700 1 $aRogers, Russ.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0627573 700 1 $aCunningham, Bryan. 776 1 $cOriginal$z1597490350$z9781597490351$w(OCoLC)61669715 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597490351$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655504$b24-02-22$c24-01-08 912 $a991003250319707536 994 $aC0$bTEF 996 $aNetwork security evaluation using the NSA IEM$91463985 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0 LEADER 01688oam 2200457 450 001 9910702695303321 005 20150102125532.0 035 $a(CKB)5470000002429231 035 $a(OCoLC)890603730 035 $a(EXLCZ)995470000002429231 100 $a20140915d2014 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 12$aA request for emergency supplemental appropriations for FY 2014 $ecommunication from the President of the United States transmitting an emergency supplemental appropriations request for fiscal year (FY) 2014 210 1$aWashington :$cU.S. Government Printing Office,$d2014. 215 $a1 online resource (3 pages) 225 1 $aHouse document / 113th Congress, 2d session ;$v113-144 300 $aTitle from title screen (viewed on Sept. 15, 2014). 300 $a"Referred to the Committee on Appropriations." 300 $a"September 8, 2014." 517 $aRequest for emergency supplemental appropriations for FY 2014 606 $aBallistic missile defenses$zIsrael$xFinance 607 $aUnited States$xAppropriations and expenditures 608 $aLegislative materials.$2lcgft 615 0$aBallistic missile defenses$xFinance. 702 $aObama$b Barack 712 02$aUnited States.$bCongress.$bHouse.$bCommittee on Appropriations, 801 0$bGPO 801 1$bGPO 801 2$bOCLCO 801 2$bGPO 801 2$bCOO 801 2$bOCLCO 801 2$bGPO 906 $aBOOK 912 $a9910702695303321 996 $aA request for emergency supplemental appropriations for FY 2014$93434427 997 $aUNINA LEADER 00908nem 2200349 n 450 001 9910791794003321 005 20200520144314.0 035 $a(CKB)2560000000057408 035 $a(MiAaPQ)EBC3329959 035 $a(Au-PeEL)EBL3329959 035 $a(CaPaEBR)ebr10015909 035 $a(OCoLC)842266230 035 $a(EXLCZ)992560000000057408 100 $a20101210d2001 uy 101 0 $aeng 135 $aurcn||||||||| 200 00$aAustin$b[electronic resource] 210 $a[S.l.] $cMaps.com$dc2001 215 $a1 online resource (1 map) 517 3 $aAustin city map 606 $aRoads$zTexas$zAustin$vMaps 607 $aAustin (Tex.)$vMaps 607 $aAustin (Tex.) 615 0$aRoads 712 02$aMaps.com (Firm) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910791794003321 996 $aAustin$93764962 997 $aUNINA