Limited Offer
Cybersecurity Operations Handbook
- 1st Edition - October 2, 2003
- Authors: John Rittinghouse PhD CISM, William M. Hancock PhD CISSP CISM
- Language: English
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 3 0 1 8 - 5
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment.
Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.
Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.
· First book written for daily operations teams
· Guidance on almost all aspects of daily operational security, asset protection, integrity management
· Critical information for compliance with Homeland Security
· Guidance on almost all aspects of daily operational security, asset protection, integrity management
· Critical information for compliance with Homeland Security
Security management, security practitioners, government security operations teams.
Why worry about Security?; Network Security Management Basics; Security Foundations; Firewalls and Perimeters; VPNs and Remote Access; Intrusion Detection in Depth; Securing Communications; Keys, Signatures, Certificates, and PKI; Hacker Exploits; Incident Handling Basics; Forensics, Investigation, and Response; Security Diligence; Business Continuity Planning; Auditing Fundamentals; Security-Management Issues; Outsourcing and Security; Security Service Level Agreements; Future Trends in Security; Sample Policy Documents
Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best
Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best
- No. of pages: 1287
- Language: English
- Edition: 1
- Published: October 2, 2003
- Imprint: Digital Press
- eBook ISBN: 9780080530185
JR
John Rittinghouse PhD CISM
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
Affiliations and expertise
SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX, USAWH
William M. Hancock PhD CISSP CISM
William M. Hancock, PhD, CISSP, CISM, is VP of Security and Chief Security Officer of Cable & Wireless, one of the largest telecom and hosting companies in the world. He has over 30 years of experience in networking, security and related technologies and is the author of many books and articles on security, networking and technology strategy.
Affiliations and expertise
VP of Security and Chief Security Officer, Cable & Wireless, one of the largest telecom and hosting companies in the world.