0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition)
Leighton Johnson
R2,148 Discovery Miles 21 480 Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback)
Leighton Johnson
R1,779 R1,630 Discovery Miles 16 300 Save R149 (8%) Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

Computer Incident Response and Forensics Team Management - Conducting a Successful Incident Response (Paperback): Leighton... Computer Incident Response and Forensics Team Management - Conducting a Successful Incident Response (Paperback)
Leighton Johnson
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

"Computer Incident Response and Forensics Team Management" provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
Provides readers with a complete handbook on computer incident response from the perspective of forensics team managementIdentify the key steps to completing a successful computer incident response investigation Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Senses: A Comprehensive Reference
Bernd Fritzsch Hardcover R88,284 Discovery Miles 882 840
Final Betrayal
Patricia Gibney Paperback R415 R381 Discovery Miles 3 810
The First Man and His Place in Creation…
George Moore Paperback R572 Discovery Miles 5 720
Endless Summer Vacation
Miley Cyrus CD R454 Discovery Miles 4 540
Live Well Between Your Ears - Get Your…
Doug Spencer Hardcover R881 Discovery Miles 8 810
Midnights
Taylor Swift CD R505 Discovery Miles 5 050
Broken Vows - How I Lost My Husband to…
Patricia Fitzmaurice Hardcover R557 Discovery Miles 5 570
The Legal Aspects of Complementary…
Bridgit Dimond Hardcover R1,670 Discovery Miles 16 700
Small Axe
Bob Marley CD R128 Discovery Miles 1 280
Power over Wrong Intimacy - The Nature…
Mahama Barwah Hardcover R881 Discovery Miles 8 810

 

Partners