by
Contos, Brian T.
Call Number
658.478 P578 22
Publication Date
2007
Summary
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Format:
Electronic Resources
Relevance:
43629.6211
by
Contos, Brian T.
Call Number
005.8 22
Publication Date
2006
Summary
Packed with vivid real-life cases, this comprehensive book addresses the most difficult to manage and costly of all security threats: the insider.
Format:
Electronic Resources
Relevance:
41500.2852
View Other Search Results
by
Mulder, Jeroen, author.
Call Number
005.1068 23
Publication Date
2021
Summary
An architect’s guide to designing, implementing, and integrating DevOps in the enterprise Key Features Design a DevOps architecture that is aligned with the overall enterprise architecture Design systems that are ready for AIOps and make the move toward NoOps Architect and implement DevSecOps pipelines, securing the DevOps enterprise Book DescriptionDigital transformation is the new paradigm in enterprises, but the big question remains: is the enterprise ready for transformation using native technology embedded in Agile/DevOps? With this book, you'll see how to design, implement, and integrate DevOps in the enterprise architecture while keeping the Ops team on board and remaining resilient. The focus of the book is not to introduce the hundreds of different tools that are available for implementing DevOps, but instead to show you how to create a successful DevOps architecture. This book provides an architectural overview of DevOps, AIOps, and DevSecOps – the three domains that drive and accelerate digital transformation. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this DevOps book will help you to successfully integrate DevOps into enterprise architecture. You'll learn what AIOps is and what value it can bring to an enterprise. Lastly, you will learn how to integrate security principles such as zero-trust and industry security frameworks into DevOps with DevSecOps. By the end of this DevOps book, you'll be able to develop robust DevOps architectures, know which toolsets you can use for your DevOps implementation, and have a deeper understanding of next-level DevOps by implementing Site Reliability Engineering (SRE). What you will learn Create DevOps architecture and integrate it with the enterprise architecture Discover how DevOps can add value to the quality of IT delivery Explore strategies to scale DevOps for an enterprise Architect SRE for an enterprise as next-level DevOps Understand AIOps and what value it can bring to an enterprise Create your AIOps architecture and integrate it into DevOps Create your DevSecOps architecture and integrate it with the existing DevOps setup Apply zero-trust principles and industry security frameworks to DevOps Who this book is for This book is for enterprise architects and consultants who want to design DevOps systems for the enterprise. It provides an architectural overview of DevOps, AIOps, and DevSecOps. If you're looking to learn about the implementation of various tools within the DevOps toolchain in detail, this book is not for you.
Format:
Electronic Resources
Relevance:
1.6112
by
Gustin, Joseph F., 1947-
Call Number
658.478 22
Publication Date
2004
Summary
Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.
Format:
Electronic Resources
Relevance:
0.9673
by
Neagu, Adrian.
Call Number
005.7585
Publication Date
2012
Summary
This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.
Format:
Electronic Resources
Relevance:
0.8896
by
Kahn, Miriam (Miriam B.), Author.
Call Number
025.82 22
Publication Date
2004
Format:
Electronic Resources
Relevance:
0.5323
by
Johnson, Mark, 1959-
Call Number
658.478 23
Publication Date
2013
Summary
"Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book.
Format:
Electronic Resources
Relevance:
0.5320
Call Number
613.6 22
Publication Date
2005
Format:
Electronic Resources
Relevance:
0.4773
by
Oppliger, Rolf.
Call Number
005.8 22
Publication Date
2003
Format:
Electronic Resources
Relevance:
0.0857
by
Dent, Alexander W.
Call Number
005.8 22
Publication Date
2004
Format:
Electronic Resources
Relevance:
0.0833
by
Kouns, Barry.
Call Number
005.8
Publication Date
2011
Summary
Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.
Format:
Electronic Resources
Relevance:
0.0772
by
Shinder, Thomas W.
Call Number
005.8 22
Publication Date
2007
Summary
Allows IT professionals to manage over 15 different firewall products.
Format:
Electronic Resources
Relevance:
0.0772
Limit Search Results
Narrowed by: