ABSTRACT

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that conside

chapter 1|23 pages

Why Do I Need Security?

chapter 2|22 pages

Understanding Requirements and Risk

chapter 3|22 pages

Security Policies and Procedures

chapter 4|25 pages

Cryptography and Encryption

chapter 5|19 pages

Authentication

chapter 6|22 pages

Network Architecture and Physical Security

chapter 7|25 pages

Firewalls and Perimeter Security

chapter 8|18 pages

Network Management and Device Security

chapter 9|13 pages

Wireless Network Security

chapter 10|24 pages

Intrusion Detection

chapter 11|22 pages

Remote Access

chapter 12|21 pages

Host Security

chapter 13|36 pages

Server Security

chapter 14|21 pages

Client Security

chapter 15|20 pages

Application Development

chapter 16|17 pages

Security Maintenance and Monitoring

chapter 17|14 pages

Vulnerability Testing

chapter 18|40 pages

Security Audits

chapter 19|39 pages

Incident Response

chapter 20|17 pages

Integrating People, Process and Technology

chapter 21|9 pages

Trends to Watch