Logo

IT Security Cookbook by Sean Boran

IT Security Cookbook
by

Publisher: Boran Consulting

Description:
This document briefly discusses threat & risk analysis, outlines the ingredients necessary to define a security policy and to provide a framework for deciding how tightly systems need to be secured, outlines policies, processes, structure and responsibilities required in a security organization, presents current security mechanisms, and provides a detailed list of technical guidelines for operating systems, applications and networks used in client/server systems.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Security and Privacy in Wireless and Mobile NetworksSecurity and Privacy in Wireless and Mobile Networks
by - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(1043 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(11604 views)
Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(2786 views)
Book cover: The Antivirus Defense-in-Depth GuideThe Antivirus Defense-in-Depth Guide
- Microsoft Corporation
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
(8873 views)