Security Planning & Disaster Recovery
Eric Maiwald, William Sieglein
- 出版商: McGraw-Hill Education
- 出版日期: 2002-05-28
- 售價: $1,590
- 貴賓價: 9.5 折 $1,511
- 語言: 英文
- 頁數: 320
- 裝訂: Paperback
- ISBN: 0072224630
- ISBN-13: 9780072224634
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$1,078Developing Windows NT Device Drivers: A Programmer's Handbook
-
$580$458 -
$680$537 -
$680$578 -
$1,300$1,274 -
$1,029Operating Systems: Internals and Design Principles, 4/e
-
$1,029Operating System Concepts, 6/e
-
$980$774 -
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$1,710$1,625 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$560$504 -
$450$351 -
$690$587 -
$420$328 -
$780$741 -
$750$638 -
$620$558 -
$650$553 -
$760$600 -
$590$466 -
$750$675 -
$560$504 -
$490$417 -
$750$593
相關主題
商品描述
Secrets and strategies for protecting your network before trouble strikes
Create and implement a successful security system and recovery plan with help from this insightful and practical resource. This detailed guide provides you with a complete roadmap for developing an effective end-to-end security program. You’ll even discover numerous methods for proactively protecting your network before a security breach occurs--saving you time, effort, and money in the long run. Covering the earliest phases of plan development, team organization and training, to technology deployment and incident recovery strategies, this book combines in-depth conceptual explanations with hands-on checklists at the end of every chapter. Definitive, authoritative, and up to date, this book is an invaluable tool in the ongoing and often challenging task of maintaining network security.
- Understand the laws and regulations affecting information security programs
- Deploy new projects and technologies in a cost-effective manner
- Define requirements and establish policies and procedures for your organization
- Respond to incidents and disasters in a systematic fashion to minimize loss or damage to valuable data
- Learn to identify, hire--and keep--security professionals and establish the reporting structure for the information security department
- Introduce human controls, including staff awareness, to help improve security
- Discover how audits and penetration tests can help in assessing risk
- Assemble an incident response team and set priorities and goals for each member
Contents
PART I: Guiding Principles in Plan
Development Ch. 1: The Role of the Information Security
Program Ch. 2: Knowing the Laws and Regulations
Ch. 3: Assessing Your Current Security/Disaster Recovery
Plan and Vulnerabilities PART II: Plan
Implementation Ch. 4: Implementing the Security
Plan Ch. 5: Establishing Policies and Procedures
Ch. 6: Deploying New Projects and Technology
Ch. 7: Raising Security Awareness of Staff to Prevent
Security Breaches Ch. 8: Monitoring Security PART
III: Plan Administration Ch. 9: Budgeting for Security
Ch. 10: The Security Team Ch. 11:
Reporting PART IV: Disaster Recovery Ch. 12:
Incident Response Ch. 13: Developing Contingency Plans
Ch. 14: Responding to Disasters PART V:
Appendices Appendix A: Handling Audits
Appendix B: Outsourcing
Security