logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance (Hardcover)

Debra S. Herrmann (지은이)
Auerbach Pub
307,810원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
252,400원 -18% 0원
12,620원
239,780원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

A Practical Guide to Security Engineering and Information Assurance
eBook 미리보기

책 정보

· 제목 : A Practical Guide to Security Engineering and Information Assurance (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780849311635
· 쪽수 : 408쪽
· 출판일 : 2001-10-18

목차

Introduction
Background
Purpose
Scope
Intended Audience
Organization
What is Information Assurance, How Does it Relate to Information Security, and Why Are Both Needed?
Definition
Application Domains
Technology Domains
Importance
Stakeholders
Summary
Discussion Problems
Historical Approaches to Information Security and Information Assurance
Physical Security
Communications Security (COMSEC)
Computer Security (COMPUSEC)
Information Security (INFOSEC)
Operations Security (OPSEC)
System Safety
System Reliability
Summary
Discussion Problems
Define the System Boundaries
Determine What is Being Protected and Why
Identify the System
Characterize System Operation
Ascertain What You Do/Do Not Have Control Over
Summary
Discussion Problems
Perform Vulnerability and Threat Analyses
Definitions
Select/Use IA Analysis Techniques
Identify Vulnerabilities, Their Type, Source, and Severity
Identify Threats, Their Type, Source, and Likelihood
Evaluate Transaction Paths, Critical Threat Zones, and Risk Exposure
Summary
Discussion Problems
Implement Threat Control Measures
Determine How Much Protection is Needed
Operational Procedures, In-Service Considerations, Controllability
Contingency Planning and Disaster Recovery
Perception Management
Select/Implement IA Design Features and Techniques
Summary
Discussion Problems
Verify Effectiveness of Threat Control Measures
Select/Employ IA Verification Techniques
Determine Residual Risk
Monitor Ongoing Risk Exposure, Responses, and Survivability
Summary
Discussion Problems
Conduct Accident/Incident Investigations
Introduction
Analyze Cause, Extent, and Consequences of Failure/Compromise
Initiate Short-term Recovery Mechanisms
Report Accident/Incident
Deploy Long-term Remedial Measures
Evaluate Legal Issues
Summary
Discussion Problems
Annex A - Glossary of Terms
Annex B - Glossary of Techniques
Annex C - Additional Resources
Annex D - Summary of the components, activities, and tasks of an effective information security/IA program
Index

저자소개

Debra S. Herrmann (지은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책