Practical Network Security - Helion
ebook
Autor: Neha SaxenaISBN: 9789387284609
stron: 328, Format: ebook
Data wydania: 2024-12-11
Księgarnia: Helion
Cena książki: 67,43 zł (poprzednio: 88,72 zł)
Oszczędzasz: 24% (-21,29 zł)
Prepare yourself for any type of audit and minimise security findings
Key Features
It follows a lifecycle approach to information security by understanding:
Description
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.
With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditors process and expectations.
What You Will Learn
Who This Book is For IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.
Table of Contents
1. Basics of Information Security
2. Threat Paradigm
3. Information Security Controls
4. Decoding Policies Standards Procedures & Guidelines
5. Network security design
6. Know your assets
7. Implementing Network Security
8. Secure Change Management
9. Vulnerability and Risk Management
10. Access Control
11. Capacity Management
12. Log Management
13. Network Monitoring
14. Information Security Audit
15. Technical Compliance Audit
16. Penetration Testing
About the Author
Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.
She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubais government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.
During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.
She holds a Masters degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.
Osoby które kupowały "Practical Network Security", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Practical Network Security eBook -- spis treści
- Cover
- Practical Network Security An Auditees Guide to Zero Findingsem
- Copyright
- copyright.xhtml
- Acknowledgement
- Acknowledgement
- Introduction
- Table of Contents
- Chapter 1: Basics of Information Security
- Chapter 2: Threat Paradigm
- Chapter 3: Information Security Controls
- Chapter 4: Decoding Policies Standards Procedures & Guidlines
- Chapter 5: Network Security Design
- Chapter 6: Know your assets
- Chapter 7: Implementing Network Security.
- Chapter 8: Secure Change Management.
- Chapter 9: Vulnerability and Risk Management.
- Chapter 10: Access Control
- Chapter 11: Capacity Management
- Chapter 12: Log Management
- Chapter 13: Network Monitoring
- Chapter 14: Information Security Audit.
- Chapter 15: Technical Compliance Audit
- Chapter 16: Penetration Testing
- Appendix