Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI
Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Business Case for Network Security: Advocacy, Governance, and ROI

Авторы: Paquet W, Saxe W.

Аннотация:

The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.


Язык: en

Рубрика: Экономика и финансы/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 408

Добавлена в каталог: 22.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
shunning      
signatures      
single-loss expectancy (SLE)      [See exposure factor;SLE (single-loss expectancy)]
site-to-site      
site-to-site encrypted VPN      
Slammer worm      2nd 3rd
SLAs      
SLAs (service-level agreements)      
SLE      2nd 3rd
SLE (single-loss expectancy)      2nd 3rd 4th
smart cards      
SMR)      2nd 3rd
sniffing      
Social engineering      
Software      
software exploitation      
software policies      
SQL Slammer      
SSH (Secure Shell)      
SSL (Secure Sockets Layer)      
SSL (Secure Sockets Layer) encryption      2nd 3rd
Standards      2nd
standby firewalls      
Stateful Failover      
stateful firewalling      2nd 3rd 4th 5th 6th 7th 8th
static biometrics      
status quo      
Steering committee      2nd 3rd
steering committees      2nd 3rd 4th
stopping      
Storing      
strengths      
striving for      2nd
strong authentication      2nd 3rd 4th
strong passwords      
structured attacks      2nd
structured threats      2nd
super cookies      
Support      
surveying      2nd 3rd
switch targets      2nd 3rd
switches      2nd
SWOT (strengths, weaknesses, opportunities, and threats)      2nd
syslog servers      
syslogs      
system penetration attacks      
Tagging      
target-based IDSs      2nd 3rd
Targets      2nd 3rd
TCO (total cost of ownership)      2nd 3rd 4th 5th 6th 7th
technologies      
test component      2nd
testing component      
The New Security Standard for the Internet, Intranets, and Virtual Private Networks (i)      
The Official Dictionary of Telecommunications Networking and Internet (i), 16th Edition      
The State of Information Security 2003 Survey      
threads      2nd 3rd
threat mitigation      
threat mitigation technologies      
threat-mitigation      
threats      
three-strike access rules      
ticket assignments      
Tokens      2nd 3rd
Tools      2nd
topologies      
topology mapping      2nd
topology standards      2nd 3rd 4th 5th
Total Cost of Ownership (TCO)      [See TCO (total cost of ownership)]
traffic efficacy      
traffic filtering      2nd
Training      
trends      2nd 3rd
Trojan horse attacks      2nd
Trojan horses      
trust exploitation      
trust exploitation attacks      
Types      2nd 3rd
unauthorized access attacks      
Understanding      2nd
United Kingdom      
United States      
unsecure user accounts      
unsecured devices      
unsecured user accounts      2nd
unstructured attacks      2nd
unstructured threats      2nd
upholding      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
URL filtering      2nd
URLs      
USB tokens      
user accounts      
user compliance      2nd 3rd 4th
user software      2nd 3rd 4th 5th 6th
using multiple brands      
utilizing      
value estimations      
vendor-based software      2nd 3rd
victim organizations      
virus protection      2nd
virus scans      
Viruses      
VLANs      
VPN concentrators      
VPN IPSec Virtual Private Networks in Depth (SAFE      
VPN policies      
VPN)      
VPNs      
vulnerabilities      
Vunerabilities      
vunerability patching      2nd
vunerability scanners      
vunerability scans      
vunerable point acknowledgements      2nd
vunerable points      
walk-by hacking      
war dialers      2nd
war driving      2nd
war-dialers      
weak passwords      
weaknesses      
Web sites      
white-box hackers      
white-hat hackers      
wireless intrusions      2nd 3rd 4th
Wireless LAN Security in Depth (SAFE      
wireless networks      
wireless policies      2nd 3rd 4th 5th
Wireless)      
wokflow      
workflow considerations      
workforce      
World Wide Web      
Worm Mitigation (SAFE      
Worm)      
worms      
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте