0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,607 Discovery Miles 26 070 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Complete Guide to CISM Certification (Hardcover): Thomas R. Peltier, Justin Peltier Complete Guide to CISM Certification (Hardcover)
Thomas R. Peltier, Justin Peltier
R2,922 Discovery Miles 29 220 Ships in 10 - 15 working days

The Certified Information Security Manager(R)(CISM(R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA(R)). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM(R) Certification examines five functional areas-security governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.

Complete Guide to CISM(R) Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R5,073 Discovery Miles 50 730 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Proverbs - Believers Church Bible…
John W Miller Paperback R796 R700 Discovery Miles 7 000
The BOOK of SHMOT EXODUS - Our Torah…
Rabbi Yoram Dahan, Yd Hatalmid Hardcover R853 Discovery Miles 8 530
Nano Optoelectronic Sensors and Devices…
Ning Xi, King Lai Paperback R3,420 R3,196 Discovery Miles 31 960
Neural Representations of Natural…
Lyndon White, Roberto Togneri, … Hardcover R2,427 Discovery Miles 24 270
Technologies for Medical Sciences
Renato M Natal Jorge, Joao Tavares, … Hardcover R2,693 Discovery Miles 26 930
Super-Resolution Imaging
Subhasis Chaudhuri Hardcover R5,298 Discovery Miles 52 980
Ezekiel - Interpretation
Joseph Blenkinsopp Hardcover R840 R719 Discovery Miles 7 190
Pistis Sophia - A Gnostic Gospel (Easy…
G. R. S Mead Hardcover R769 Discovery Miles 7 690
Optical Biomimetics - Materials and…
Maryanne Large Hardcover R4,096 R3,811 Discovery Miles 38 110
New Developments in Sensing Technology…
Subhas Chandra Mukhopadhyay Hardcover R4,072 Discovery Miles 40 720

 

Partners