0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,617 Discovery Miles 26 170 Ships in 12 - 19 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Complete Guide to CISM Certification (Hardcover): Thomas R. Peltier, Justin Peltier Complete Guide to CISM Certification (Hardcover)
Thomas R. Peltier, Justin Peltier
R3,104 Discovery Miles 31 040 Ships in 12 - 19 working days

The Certified Information Security Manager(R)(CISM(R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA(R)). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM(R) Certification examines five functional areas-security governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.

Complete Guide to CISM(R) Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R5,091 Discovery Miles 50 910 Ships in 12 - 19 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lesbian, Queer, and Bisexual Women in…
Ahoo Tabatabai Hardcover R3,114 R2,194 Discovery Miles 21 940
The Death Of Democracy - Hitler's Rise…
Benjamin Carter Hett Paperback  (1)
R333 R302 Discovery Miles 3 020
Inclusive Green Growth - Challenges and…
Calvin Atewamba, Dorothe Yong Ngondjeb Hardcover R2,917 Discovery Miles 29 170
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R340 R304 Discovery Miles 3 040
Sustainable Development Research at…
Walter Leal Filho Hardcover R4,307 R3,737 Discovery Miles 37 370
Insectopedia - The Secret World of…
Erik Holm Paperback  (3)
R350 R323 Discovery Miles 3 230
Art et Liberte - Rupture, War and…
Sam Bardaouil, Till Fellrath Paperback R901 R746 Discovery Miles 7 460
The Life of John Knox
Thomas M'Crie Paperback R288 Discovery Miles 2 880
Vusi - Business & Life Lessons From a…
Vusi Thembekwayo Paperback  (3)
R325 R305 Discovery Miles 3 050
Serving the Church, Reaching the World…
Richard Cunningham Paperback R308 Discovery Miles 3 080

 

Partners