0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition)
Leighton Johnson
R2,148 Discovery Miles 21 480 Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback)
Leighton Johnson
R1,779 R1,630 Discovery Miles 16 300 Save R149 (8%) Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

Computer Incident Response and Forensics Team Management - Conducting a Successful Incident Response (Paperback): Leighton... Computer Incident Response and Forensics Team Management - Conducting a Successful Incident Response (Paperback)
Leighton Johnson
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

"Computer Incident Response and Forensics Team Management" provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
Provides readers with a complete handbook on computer incident response from the perspective of forensics team managementIdentify the key steps to completing a successful computer incident response investigation Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wilde's Cycle Route Guide - The…
Gillian Rowan-Wilde Paperback R232 Discovery Miles 2 320
Cycling Home from Siberia - 30,000…
Rob Lilwall Paperback R596 R545 Discovery Miles 5 450
The Rhine Cycle Route - Cycle touring…
Mike Wells Paperback R513 R425 Discovery Miles 4 250
The Middle - How To Keep Going In…
Travis Gale Paperback R250 R223 Discovery Miles 2 230
More Routes in the Lake District, the…
Jeremy Ashcroft Paperback R245 Discovery Miles 2 450
Cotswold Cycle Rides - Family Cycle…
Sheila Booth Paperback R225 Discovery Miles 2 250
Rail-Trails Pennsylvania - The…
Rails-To-Trails Conservancy Hardcover R1,052 R890 Discovery Miles 8 900
Cycling in the Peak District - 21 routes…
Chiz Dakin Paperback R423 R349 Discovery Miles 3 490
Rail-Trail Hall of Fame - A Selection of…
Rails-To-Trails Conservancy Hardcover R869 R748 Discovery Miles 7 480
Traffic-Free Cycle Trails South East…
Nick Cotton, Kathy Rogers Paperback R493 Discovery Miles 4 930

 

Partners