LEADER 03769cam a2200409Ii 4500 001 991003251459707536 006 m d 007 cr cn||||||||| 008 070802s2006 maua s 001 0 eng d 020 $a9781597491105 020 $a1597491101 035 $ab13655681-39ule_inst 037 $a136078:136211$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aOsborne, Mark.$0627562 245 10$aHow to cheat at managing information security$h[electronic resource] /$cMark Osborne ; Paul M. Summitt, technical editor. 246 30$aManaging information security 260 $aRockland, MA :$bSyngress ;$a[S.l.] :$bDistributed by O'Reilly Media in the United States and Canada,$cc2006. 300 $axxv, 315 p. :$bill. ;$c23 cm. 500 $aIncludes index. 505 0 $aChapter 1: Preface and Introduction Chapter 2: The Security Organization Chapter 3: The Information Security Policy Chapter 4: Jargon, principles and concepts Chapter 5: Information Security laws and regulations Chapter 6: Information Security Standards and Audits Chapter 7: Interviews, Bosses and Staff Chapter 8: Infrastructure security Chapter 9: Firewalls Chapter 10: Intruder detection systems Theory Chapter 11: Intruder detection systems In Practice Chapter 12: Intruder Prevention and Protection Chapter13: Network penetration testing Chapter14: Application security flaws and application testing. 520 $aThis is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure * A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies * Navigate through jargon filled meetings with this handy aid * Provides information on understanding the design flaws of E-commerce and DMZ infrastructure. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on July 25, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer security$xManagement. 650 0$aInformation technology$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aSummitt, Paul M. 776 1 $cOriginal$z1597491101$z9781597491105$w(OCoLC)71261147 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597491105$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655681$b24-02-22$c24-01-08 912 $a991003251459707536 994 $aC0$bTEF 996 $aHow to cheat at managing information security$91213104 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0 LEADER 03522nam 2200685 a 450 001 9910961696103321 005 20251116141227.0 010 $a9786610210848 010 $a9780309175104 010 $a0309175100 010 $a9781280210846 010 $a1280210842 010 $a9780309553230 010 $a0309553237 010 $a9780585002118 010 $a0585002118 035 $a(CKB)110986584753452 035 $a(OCoLC)42328503 035 $a(CaPaEBR)ebrary10062932 035 $a(SSID)ssj0000224825 035 $a(PQKBManifestationID)11202317 035 $a(PQKBTitleCode)TC0000224825 035 $a(PQKBWorkID)10210878 035 $a(PQKB)10380461 035 $a(MiAaPQ)EBC3377004 035 $a(Au-PeEL)EBL3377004 035 $a(CaPaEBR)ebr10062932 035 $a(CaONFJC)MIL21084 035 $a(OCoLC)923267608 035 $a(Perlego)4735978 035 $a(BIP)47377454 035 $a(EXLCZ)99110986584753452 100 $a19961125d1997 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aPost-Cold war conflict deterrence 210 $aWashington, D.C. $cNational Academy Press$d1997 215 $a1 online resource (243 p.) 300 $a"Naval Studies Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." 311 08$a9780309056397 311 08$a030905639X 320 $aIncludes bibliographical references. 330 $aDeterrence as a strategic concept evolved during the Cold War. During that period, deterrence strategy was aimed mainly at preventing aggression against the United States and its close allies by the hostile Communist power centers--the Union of Soviet Socialist Republics (USSR) and its allies, Communist China and North Korea. In particular, the strategy was devised to prevent aggression involving nuclear attack by the USSR or China. Since the end of the Cold War, the risk of war among the major powers has subsided to the lowest point in modern history. Still, the changing nature of the threats to American and allied security interests has stimulated a considerable broadening of the deterrence concept. Post-Cold War Conflict Deterrence examines the meaning of deterrence in this new environment and identifies key elements of a post-Cold War deterrence strategy and the critical issues in devising such a strategy. It further examines the significance of these findings for the U.S. Navy and Marine Corps. Quantitative and qualitative measures to support judgments about the potential success or failure of deterrence are identified. Such measures will bear on the suitability of the naval forces to meet the deterrence objectives. The capabilities of U.S. naval forces that especially bear on the deterrence objectives also are examined. Finally, the book examines the utility of models, games, and simulations as decision aids in improving the naval forces' understanding of situations in which deterrence must be used and in improving the potential success of deterrence actions. 606 $aMilitary policy 606 $aNuclear warfare 606 $aDeterrence (Strategy) 615 0$aMilitary policy. 615 0$aNuclear warfare. 615 0$aDeterrence (Strategy) 676 $a327.1/72 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910961696103321 996 $aPost-Cold war conflict deterrence$94352174 997 $aUNINA