Logo

IT Security Cookbook by Sean Boran

IT Security Cookbook
by

Publisher: Boran Consulting

Description:
This document briefly discusses threat & risk analysis, outlines the ingredients necessary to define a security policy and to provide a framework for deciding how tightly systems need to be secured, outlines policies, processes, structure and responsibilities required in a security organization, presents current security mechanisms, and provides a detailed list of technical guidelines for operating systems, applications and networks used in client/server systems.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Good Digital Hygiene: A guide to staying secure in cyberspaceGood Digital Hygiene: A guide to staying secure in cyberspace
by - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(5036 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(5465 views)
Book cover: Rethinking Public Key Infrastructures and Digital CertificatesRethinking Public Key Infrastructures and Digital Certificates
by - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(7051 views)
Book cover: The Open-source PKI BookThe Open-source PKI Book
by - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(5558 views)