Security Planning & Disaster Recovery
            
暫譯: 安全規劃與災難恢復
        
        Eric Maiwald, William Sieglein
- 出版商: McGraw-Hill Education
- 出版日期: 2002-05-28
- 售價: $1,500
- 貴賓價: 9.5 折 $1,425
- 語言: 英文
- 頁數: 320
- 裝訂: Paperback
- ISBN: 0072224630
- ISBN-13: 9780072224634
- 
    相關分類:
    
      Penetration-test
 
海外代購書籍(需單獨結帳)
買這商品的人也買了...
- 
                
                   Developing Windows NT Device Drivers: A Programmer's Handbook Developing Windows NT Device Drivers: A Programmer's Handbook$1,100$1,078
- 
                
                   Visual C++ 6 教學手冊 (Beginning Visual C++ 6) Visual C++ 6 教學手冊 (Beginning Visual C++ 6)$580$458
- 
                
                   計算機組織與設計--軟硬體界面第二版 (Computer Organization & Design, 2/e) 計算機組織與設計--軟硬體界面第二版 (Computer Organization & Design, 2/e)$680$537
- 
                
                   SQL Server 2000 管理實務 SQL Server 2000 管理實務$680$578
- 
                
                   Introduction to Automata Theory, Languages, and Computation, 2/e(精裝本) Introduction to Automata Theory, Languages, and Computation, 2/e(精裝本)$1,300$1,274
- 
                
                   Operating Systems: Internals and Design Principles, 4/e Operating Systems: Internals and Design Principles, 4/e$1,050$1,029
- 
                
                   Operating System Concepts, 6/e Operating System Concepts, 6/e$1,050$1,029
- 
                
                   C++ Primer, 3/e 中文版 C++ Primer, 3/e 中文版$980$774
- 
                
                   $825Cisco CCNA Exam #640-607 Certification Guide, 3/e $825Cisco CCNA Exam #640-607 Certification Guide, 3/e
- 
                
                   802.11 Wireless Networks: The Definitive Guide 802.11 Wireless Networks: The Definitive Guide$1,620$1,539
- 
                
                   Computer Architecture: A Quantitative Approach, 3/e(精裝本) Computer Architecture: A Quantitative Approach, 3/e(精裝本)$1,300$1,274
- 
                
                   鳥哥的 Linux 私房菜 鳥哥的 Linux 私房菜$560$476
- 
                
                   JavaScript 範例活用辭典 JavaScript 範例活用辭典$450$351
- 
                
                   C++ Builder 6 完全攻略 C++ Builder 6 完全攻略$690$587
- 
                
                   Web 好色-網頁色彩學 Web 好色-網頁色彩學$420$328
- 
                
                   作業系統概念 (Operating System Concepts, 6/e Windows XP Update) 作業系統概念 (Operating System Concepts, 6/e Windows XP Update)$780$741
- 
                
                   Java 完美經典優質學習篇 Java 完美經典優質學習篇$750$638
- 
                
                   Dreamweaver MX for JSP 夢幻咖啡香 Dreamweaver MX for JSP 夢幻咖啡香$620$527
- 
                
                   Red Hat Linux 9 實務應用 Red Hat Linux 9 實務應用$650$553
- 
                
                   802.11 無線網路技術通論 (802.11 Wireless Networks: The Definitive Guide) 802.11 無線網路技術通論 (802.11 Wireless Networks: The Definitive Guide)$760$600
- 
                
                   ASP.NET 程式設計徹底研究 ASP.NET 程式設計徹底研究$590$466
- 
                
                   鳥哥的 Linux 私房菜-伺服器架設篇 鳥哥的 Linux 私房菜-伺服器架設篇$750$638
- 
                
                   鳥哥的 Linux 私房菜─基礎學習篇增訂版 鳥哥的 Linux 私房菜─基礎學習篇增訂版$560$476
- 
                
                   Dreamweaver MX 2004 魔法書中文版 Dreamweaver MX 2004 魔法書中文版$490$417
- 
                
                   JSP 2.0 技術手冊 JSP 2.0 技術手冊$750$593
商品描述
Secrets and strategies for protecting your network before trouble strikes
Create and implement a successful security system and recovery plan with help from this insightful and practical resource. This detailed guide provides you with a complete roadmap for developing an effective end-to-end security program. You’ll even discover numerous methods for proactively protecting your network before a security breach occurs--saving you time, effort, and money in the long run. Covering the earliest phases of plan development, team organization and training, to technology deployment and incident recovery strategies, this book combines in-depth conceptual explanations with hands-on checklists at the end of every chapter. Definitive, authoritative, and up to date, this book is an invaluable tool in the ongoing and often challenging task of maintaining network security.
- Understand the laws and regulations affecting information security programs
- Deploy new projects and technologies in a cost-effective manner
- Define requirements and establish policies and procedures for your organization
- Respond to incidents and disasters in a systematic fashion to minimize loss or damage to valuable data
- Learn to identify, hire--and keep--security professionals and establish the reporting structure for the information security department
- Introduce human controls, including staff awareness, to help improve security
- Discover how audits and penetration tests can help in assessing risk
- Assemble an incident response team and set priorities and goals for each member
Contents            
  PART I: Guiding Principles in Plan 
  Development   Ch. 1: The Role of the Information Security 
  Program   Ch. 2: Knowing the Laws and Regulations 
     Ch. 3: Assessing Your Current Security/Disaster Recovery 
  Plan and Vulnerabilities  PART II: Plan 
  Implementation   Ch. 4: Implementing the Security 
  Plan   Ch. 5: Establishing Policies and Procedures 
     Ch. 6: Deploying New Projects and Technology 
     Ch. 7: Raising Security Awareness of Staff to Prevent 
  Security Breaches   Ch. 8: Monitoring Security  PART 
  III: Plan Administration   Ch. 9: Budgeting for Security 
     Ch. 10: The Security Team    Ch. 11: 
  Reporting   PART IV: Disaster Recovery   Ch. 12: 
  Incident Response    Ch. 13: Developing Contingency Plans 
     Ch. 14: Responding to Disasters  PART V: 
  Appendices    Appendix A: Handling Audits 
      Appendix B: Outsourcing 
Security
    
商品描述(中文翻譯)
秘密與策略,保護您的網路在麻煩來臨之前
利用這本具洞察力和實用性的資源,建立並實施成功的安全系統和恢復計劃。這本詳細的指南為您提供了一個完整的路線圖,以開發有效的端到端安全計劃。您甚至會發現許多主動保護您的網路的方法,以防止安全漏洞的發生,從而在長期內節省時間、精力和金錢。本書涵蓋了計劃開發的最早階段、團隊組織與訓練、技術部署及事件恢復策略,結合了深入的概念解釋和每章結尾的實用檢查清單。本書權威且最新,是在持續且常常具有挑戰性的網路安全維護任務中不可或缺的工具。
- 了解影響資訊安全計劃的法律和法規
- 以具成本效益的方式部署新項目和技術
- 定義需求並為您的組織建立政策和程序
- 以系統化的方式回應事件和災難,以最小化對重要數據的損失或損害
- 學習識別、聘用並留住安全專業人員,並為資訊安全部門建立報告結構
- 引入人為控制,包括員工意識,以幫助改善安全性
- 發現審計和滲透測試如何幫助評估風險
- 組建事件響應團隊,並為每位成員設定優先事項和目標
內容
            第一部分:計劃開發的指導原則   第1章:資訊安全計劃的角色   第2章:了解法律和法規   第3章:評估您當前的安全/災難恢復計劃及其脆弱性  第二部分:計劃實施   第4章:實施安全計劃   第5章:建立政策和程序   第6章:部署新項目和技術   第7章:提高員工的安全意識以防止安全漏洞   第8章:監控安全  第三部分:計劃管理   第9章:安全預算   第10章:安全團隊   第11章:報告  第四部分:災難恢復   第12章:事件響應   第13章:制定應急計劃   第14章:應對災難  第五部分:附錄    附錄A:處理審計    附錄B:外包安全

 
     
     
    
 
     
     
     
     
     
    
 
     
     
    