Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Network security auditing
Bookmark Share

Text

Network security auditing

Jackson, Chris - Personal Name;

Contents:

Ch. 1 The Principles of Auditing
Security Fundamentals: The Five Pillars
Building a Security Program
Security Controls
Managing Risk
How, What, and Why You Audit

ch. 2 Information Security and the Law
IT Security Laws
Hacking, Cracking, and Fraud Laws
Intellectual Property Laws
Can-Spam Act of 2003
State and Local Laws
Reporting a Crime
Regulatory Compliance Laws

ch. 3 Information Security Governance, Frameworks, and Standards
Understanding Information Security Governance
Process: Security Governance Frameworks
Technology: Standards Procedures and Guidelines

ch. 4 Auditing Tools and Techniques
Evaluating Security Controls
Auditing Security Practices
Testing Security Technology
Security Testing Frameworks
Security Auditing Tools

ch. 5 Auditing Cisco Security Solutions
Auditors and Technology
Security as a System
Cisco Security Auditing Domains
Defining the Audit Scope of a Domain
Identifying Security Controls to Assess
Mapping Security Controls to Cisco Solutions
The Audit Checklist

ch. 6 Policy, Compliance, and Management
Do You Know Where Your Policy Is?
Auditing Security Policies
Standard Policies
Policies for Regulatory and Industry Compliance
Cisco Policy Management and Monitoring Tools

ch. 7 Infrastructure Security
Infrastructure Threats
Policy Review
Infrastructure Operational Review
Technical Testing

ch. 8 Perimeter Intrusion Prevention
Perimeter Threats and Risk
Policy review
Perimeter Operations Review
Perimeter Architecture Review
Auditing Firewall
Auditing IPS

ch. 9 Access Control
Fundamentals of Access Control
Access Control Threats and Risks
Access Control Policy
Access Control Operational Review
Access Control Architecture Review
Technical testing

ch. 10 Secure Remote Access
Defining the Network Edge
VPN Fundamentals
Remote Access Threats and Risks
Remote Access Policies
Remote Access Operational Review
Remote Access Architecture Revie
Technical testing

ch. 11 Endpoint Protection
Endpoint Risks
Endpoint Threats
Policy review
Endpoint Protection Operational Control Review
Endpoint Architecture Review

ch. 12 Unified Communications
Unified Communications Risks
VoIP Threats
UC Policy and Standards Review
UC Operational Control Review
UC Architecture Review


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 JAC n
b0001358
Available - Available
Detail Information
Series Title
--
Call Number
005.8 JAC n
Publisher
Indianapolis : Cisco Press., 2010
Collation
xxiv, 488 hal.; ilus.; 23 cm
Language
English
ISBN/ISSN
9781587053528
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Computer networks -- Security measures
Specific Detail Info
--
Statement of Responsibility
Chris Jackson
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?