Record ID | ia:networksecuritye0000full |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/networksecuritye0000full/networksecuritye0000full_marc.xml |
Download MARC binary | https://www.archive.org/download/networksecuritye0000full/networksecuritye0000full_meta.mrc |
LEADER: 05793cam 2200757Ma 4500
001 ocn559995712
003 OCoLC
005 20221007091529.0
008 051121s2005 maua o 001 0 eng d
006 m o d
007 cr cn|||||||||
040 $aMERUC$beng$epn$cMERUC$dCCO$dE7B$dIDEBK$dOCLCQ$dZYU$dDKDLA$dZCU$dOCLCQ$dFVL$dCSU$dOCLCQ$dOCLCO$dOCLCQ$dOCLCF$dOCLCQ$dREB$dAZK$dLOA$dCOCUF$dCNNOR$dMOR$dPIFBR$dOCLCQ$dU3W$dOCLCA$dSTF$dBRL$dWRM$dNRAMU$dINT$dVT2$dOCLCQ$dWYU$dA6Q$dOCLCQ$dVLY$dK6U$dOCLCO
019 $a79419644$a473076665$a475322035$a507352145$a647464719$a722429609$a728028313$a888451129$a961586339$a962649505$a966248190$a988500910$a992111196$a1035697043$a1037508419$a1038646616$a1045543836$a1055391684$a1058718517$a1076320080$a1081249480$a1097109497$a1161999577$a1228581217$a1241774184$a1290080803$a1300625924
020 $a9781597490351
020 $a1597490350
020 $a0080489435
020 $a9780080489438
020 $z1597490350
020 $z9780080489438
020 $a1281035599
020 $a9781281035592
020 $a9786611035594
020 $a6611035591
020 $a1597499919
020 $a9781597499910
024 1 $a792502903506
035 $a(OCoLC)559995712$z(OCoLC)79419644$z(OCoLC)473076665$z(OCoLC)475322035$z(OCoLC)507352145$z(OCoLC)647464719$z(OCoLC)722429609$z(OCoLC)728028313$z(OCoLC)888451129$z(OCoLC)961586339$z(OCoLC)962649505$z(OCoLC)966248190$z(OCoLC)988500910$z(OCoLC)992111196$z(OCoLC)1035697043$z(OCoLC)1037508419$z(OCoLC)1038646616$z(OCoLC)1045543836$z(OCoLC)1055391684$z(OCoLC)1058718517$z(OCoLC)1076320080$z(OCoLC)1081249480$z(OCoLC)1097109497$z(OCoLC)1161999577$z(OCoLC)1228581217$z(OCoLC)1241774184$z(OCoLC)1290080803$z(OCoLC)1300625924
037 $b00991439
050 4 $aTK5105.59$b.F85 2005eb
082 04 $a005.8$222
100 1 $aFuller, Ed.
245 10 $aNetwork security evaluation :$busing the NSA IEM /$cEd Fuller.
260 $aRockland, Mass. :$bSyngress Pub.,$c©2005.
300 $a1 online resource (xxvi, 437 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file$2rda
500 $aIncludes index.
588 0 $aPrint version record.
520 8 $aAnnotation$bNetwork Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed information is given in later chapters about the core technical processes that need to occur to ensure a comprehensive understanding of the network's security posture.<br /><br />Ten baseline areas for evaluation are covered in detail. The tools and examples detailed within this book include both Freeware and Commercial tools that provide a detailed analysis of security vulnerabilities on the target network. The book ends with guidance on the creation of customer roadmaps to better security and recommendations on the format and delivery of the final report.<br /><br />* There is no other book currently on the market that covers the National Security Agency's recommended methodology for conducting technical security evaluations<br />* The authors are well known in the industry for their work in developing and deploying network security evaluations using the NSA IEM<br />* The authors also developed the NSA's training class on this methodology.
505 0 $aCover; Contents; Prologue Why the IEM?; Chapter 1 Introducing the INFOSEC Evaluation Methodology; Chapter 2 Before the Evaluation Starts; Chapter 3 Setting Expectations; Chapter 4 Scoping the Evaluation; Chapter 5 Legal Principles for Information Security Evaluations1; Chapter 6 Building the Technical Evaluation Plan; Chapter 7 Starting Your On-Site Efforts; Chapter 8 Network Discovery Activities; Chapter 9 Collecting the Majority of Vulnerabilities; Chapter 10 Fine-Tuning the Evaluation; Chapter 11 The Onsite Closing Meeting; Chapter 12 Post-Evaluation Analysis
505 8 $aChapter 13 Creating Measurements and Trending ResultsChapter 14 Trending Metrics; Chapter 15 Final Reporting; Chapter 16 Summing Up; Appendix A Examples of INFOSEC Tools by Baseline Activity; Technical Evaluation Plan Outline and Sample; Index; Related Titles
546 $aEnglish.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures.
650 6 $aSécurité informatique.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
655 0 $aElectronic books.
655 4 $aElectronic books.
776 $z1-59749-035-0
856 40 $3ebrary$uhttp://site.ebrary.com/id/10110289
856 40 $3MyiLibrary$uhttp://www.myilibrary.com?id=103559
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=254842
856 40 $zFull text available from Referex Security and Networking$uhttp://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490351
856 40 $zVIEW FULL TEXT$uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000209428&T=marc&tab=BOOKS
856 40 $uhttps://ebookcentral.proquest.com/lib/uvic/detail.action?docID=254842
938 $aebrary$bEBRY$nebr10110289
029 1 $aAU@$b000053226275
029 1 $aDKDLA$b820120-katalog:000504501
029 1 $aNZ1$b12033487
029 1 $aAU@$b000057122373
994 $aZ0$bGTX
948 $hNO HOLDINGS IN GTX - 1057 OTHER HOLDINGS