Skip to content
You are not logged in |Login  

LEADER 00000cam  2200601Ii 4500 
001    ocn905696121 
003    OCoLC 
005    20160518075609.1 
006    m     o  d         
007    cr cnu|||unuuu 
008    150327s2014    enk     o     000 0 eng d 
019    923547205|a923645871|a928193723|a929142793 
020    9781849286008|q(electronic bk.) 
020    1849286000|q(electronic bk.) 
035    (OCoLC)905696121|z(OCoLC)923547205|z(OCoLC)923645871
       |z(OCoLC)928193723|z(OCoLC)929142793 
040    N$T|beng|erda|epn|cN$T|dN$T|dJSTOR|dOCLCF|dEBLCP|dCOO 
049    GTKE 
050  4 QA76.9.A25|bV53 2014 
082 04 005.8|223 
100 1  Vladimirov, Andrew A.,|eauthor. 
245 10 Assessing information security :|bstrategies, tactics, 
       logic and framework /|cA. Vladimirov, K. Gavrilenko, A. 
       Michajlowski. 
250    Second edition. 
264  1 Ely, Cambridgeshire :|bIT Governance Publishing,|c2014. 
300    1 online resource (424 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references. 
505 0  ""Cover""; ""Title""; ""Copyright""; ""Contents""; 
       ""Introduction""; ""Chapter 1: Information Security 
       Auditing and Strategy""; ""The mindsets of ignorance""; 
       ""Defence-in-depth""; ""Compelling adversaries to adapt"";
       ""Chapter 2: Security Auditing, Governance, Policies and 
       Compliance""; ""General security policy shortcomings""; 
       ""Addressing security audits in policy statements""; ""The
       erroneous path to compliance""; ""Getting down to earth"";
       ""Chapter 3: Security Assessments Classification""; 
       ""Black, grey and white box tests""; ""Assessments 
       specialisations and actual scopes"" 
505 8  ""On technical information security assessments""""Server,
       client and network-centric tests""; ""IT security testing 
       levels and target areas""; ""'Idiosyncratic' technical 
       security tests""; ""On non-technical information security 
       audits""; ""Premises and physical security checks""; 
       ""Social engineering tests""; ""Security documentation 
       reviews""; ""Assessing security processes""; ""Chapter 4: 
       Advanced Pre-Assessment Planning""; ""The four-stage 
       framework""; ""Selecting the targets of assessment""; 
       ""Evaluating what is on offer""; ""Professional 
       certifications and education"" 
505 8  ""Publications and tools""""The auditor company history 
       and size""; ""Dealing with common assessment 
       emergencies""; ""Chapter 5: Security Audit Strategies and 
       Tactics""; ""Centres of gravity and their types""; 
       ""Identifying critical points""; ""The strategic 
       exploitation cycle""; ""External technical assessment 
       recon""; ""Social engineering recon""; ""Internal 
       technical assessment recon""; ""Technical vulnerability 
       discovery process""; ""A brief on human vulnerabilities"";
       ""The tactical exploitation cycle""; ""Front, flank, 
       simple, complex""; ""The strategies of creating gaps"" 
505 8  ""Chapter 6: Synthetic Evaluation of Risks""""Risk, 
       uncertainty and ugly Black Swans""; ""On suitable risk 
       analysis methodologies""; ""On treatment of information 
       security risks""; ""Relevant vulnerability categories""; 
       ""Gauging attacker skill""; ""Weighting vulnerability 
       impact""; ""Contemplating the vulnerability remedy""; 
       ""Defining vulnerability risk level""; ""Risks faced by 
       large components""; ""Compound risks, systempunkts and 
       attacker logic""; ""Total risk summary utilisation and 
       dissection""; ""Chapter 7: Presenting the Outcome and 
       Follow-Up Acts""; ""The report audience and style"" 
505 8  ""The report summary""""The report interpretation 
       chapter""; ""The bulk of the report""; ""Explaining the 
       overall security state""; ""Elaborating on breakdown of 
       risks""; ""Using vulnerability origin investigations""; 
       ""Post-audit assistance and follow-up hurdles""; ""Chapter
       8: Reviewing Security Assessment Failures and Auditor 
       Management Strategies""; ""Bad tactics and poor tests""; 
       ""On the assessment team ordnance""; ""Of serpents and 
       eagles""; ""ITG Resources"" 
520    Build a strategic response to cyber attacks The activities
       of the cyber criminal are both deliberate and hostile, and
       they can be compared to military operations. Many people 
       in business understand that the insights from the classics
       of military strategy are as relevant to modern commerce as
       they are to war. It is clear that organisations need to 
       develop a view of cybersecurity that goes beyond 
       technology: all staff in the organisation have a role to 
       play, and it is the senior managers who must ensure, like 
       generals marshalling their forces, that all staff know the
       cyber security policies that. 
588 0  Vendor-supplied metadata. 
650  0 Computer security. 
650  0 Information technology. 
650  0 Computer security|zUnited States. 
650  0 Data protection|zUnited States. 
650  7 COMPUTERS / Internet / Security.|2bisacsh 
650  7 COMPUTERS / Networking / Security.|2bisacsh 
650  7 COMPUTERS / Security / General.|2bisacsh 
650  7 COMPUTERS / General.|2bisacsh 
650  7 Computer security.|2fast|0(OCoLC)fst00872484 
650  7 Information technology.|2fast|0(OCoLC)fst00973089 
655  0 Electronic books. 
700 1  Gavrilenko, Konstantin,|eauthor. 
700 1  Michajlowski, Anej.,|eauthor. 
776 08 |iPrint version:|aVladimirov, Andrew|tAssessing 
       Information Security : Strategies, Tactics, Logic and 
       Framewortk|dCambridge : IT Governance Ltd,c1900
       |z9781849285995 
914    ocn905696121 
994    93|bGTK 
Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO