0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition)
Leighton Johnson
R2,148 Discovery Miles 21 480 Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback)
Leighton Johnson
R1,779 R1,630 Discovery Miles 16 300 Save R149 (8%) Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

Computer Incident Response and Forensics Team Management - Conducting a Successful Incident Response (Paperback): Leighton... Computer Incident Response and Forensics Team Management - Conducting a Successful Incident Response (Paperback)
Leighton Johnson
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

"Computer Incident Response and Forensics Team Management" provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
Provides readers with a complete handbook on computer incident response from the perspective of forensics team managementIdentify the key steps to completing a successful computer incident response investigation Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Behind Prison Walls - Unlocking a Safer…
Edwin Cameron, Rebecca Gore, … Paperback R350 R312 Discovery Miles 3 120
Amsterdam
Christian Bale, Margot Robbie, … DVD R210 Discovery Miles 2 100
Home Classix Trusty Traveller Mug…
R99 R69 Discovery Miles 690
Moon Bag (Black)
R63 Discovery Miles 630
Peptine Pro Canine/Feline Hydrolysed…
R369 R259 Discovery Miles 2 590
Christmas Nativity Set - 11 Pieces
R599 R539 Discovery Miles 5 390
Parker Jotter Ballpoint Pen & Pencil Set…
 (1)
R889 Discovery Miles 8 890
Lacoste Red Style In Play Eau De…
R1,075 Discovery Miles 10 750

 

Partners