0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (7)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

BIOS Protection Guidelines - Recommendations of the National Institute of Standards and Technology (Special Publication... BIOS Protection Guidelines - Recommendations of the National Institute of Standards and Technology (Special Publication 800-147) (Paperback)
William Polk, Andrew Regenscheid, Murugiah Souppaya
R319 Discovery Miles 3 190 Ships in 10 - 15 working days

This National Institute of Standards and Technology Special Publication 800-147 "BIOS Protection Guidelines" document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS's unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization -either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware). As used in this publication, the term BIOS refers to conventional BIOS, Extensible Firmware Interface (EFI) BIOS, and Unified Extensible Firmware Interface (UEFI) BIOS. This document applies to system BIOS firmware (e.g., conventional BIOS or UEFI BIOS) stored in the system flash memory of computer systems, including portions that may be formatted as Option ROMs. However, it does not apply to Option ROMs, UEFI drivers, and firmware stored elsewhere in a computer system. While this document focuses on current and future x86 and x64 client platforms, the controls and procedures are independent of any particular system design. Likewise, although the guide is oriented toward enterprise-class platforms, the necessary technologies are expected to migrate to consumer-grade systems over time. Future efforts may look at boot firmware security for enterprise server platforms.

Guidelines for Securing Wireless Local Area Networks (WLANS) (Paperback): Karen Scarfone, U. S. Department of Commerce,... Guidelines for Securing Wireless Local Area Networks (WLANS) (Paperback)
Karen Scarfone, U. S. Department of Commerce, Murugiah Souppaya
R362 Discovery Miles 3 620 Ships in 10 - 15 working days

The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating and strengthening their key recommendations.

Guide to Computer Security Log Management - Recommendations of the National Institute of Standards and Technology: Special... Guide to Computer Security Log Management - Recommendations of the National Institute of Standards and Technology: Special Publication 800-92 (Paperback)
Murugiah Souppaya, Karen Kent
R330 Discovery Miles 3 300 Ships in 10 - 15 working days

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL's research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. Topics covered include an Introduction to Computer Log Management, Log management Infrastructure, Log Management Planning, and Log Management Operational Processes

Guidelines for Securing Wireless Local Area Networks (WLANs) - Recommendations of the National Institute of Standards and... Guidelines for Securing Wireless Local Area Networks (WLANs) - Recommendations of the National Institute of Standards and Technology (Special Publication 800-153) (Paperback)
Karen Scarfone, Murugiah Souppaya
R365 Discovery Miles 3 650 Ships in 10 - 15 working days

The National Institute of Standards and Technology Special Publication 800-153 provides information on the Guidelines for Securing Wireless Local Area Networks (WLANs). A wireless local area network (WLAN) is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The security of each WLAN is heavily dependent on how well each WLAN component-including client devices, APs, and wireless switches-is secured throughout the WLAN lifecycle, from initial WLAN design and deployment through ongoing maintenance and monitoring. The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating and strengthening their key recommendations.

Guide to Securing Microsoft Windows XP Systems for IT Professionals - A NIST Security Configuration Checklist (Paperback):... Guide to Securing Microsoft Windows XP Systems for IT Professionals - A NIST Security Configuration Checklist (Paperback)
Murugiah Souppaya, Paul M. Johnson, Karen Scarfone
R367 Discovery Miles 3 670 Ships in 10 - 15 working days

This guide provides detailed information about the security of Windows XP, security configuration guidelines for popular applications, and security configuration guidelines for the Windows XP operating system. The guide documents the methods that system administrators can use to implement each security setting recommended. The principal goal of the document is to recommend and explain tested, secure settings for Windows XP workstations with the objective of simplifying the administrative burden of improving the security of Windows XP systems in five types of environments: SOHO, enterprise, and three custom environments, specialized security-limited functionality, legacy, and Federal Desktop Core Configuration (FDCC).

User's Guide to Securing External Devices for Telework and Remote Access (Paperback): Karen Scarfone, Murugiah Souppaya,... User's Guide to Securing External Devices for Telework and Remote Access (Paperback)
Karen Scarfone, Murugiah Souppaya, U. S. Department of Commerce
R478 Discovery Miles 4 780 Ships in 10 - 15 working days

This publication helps teleworkers secure the external devices they use for telework, such as personally owned and third-party privately owned desktop and laptop computers and consumer devices (e.g., cell phones, personal digital assistants PDA]). The document focuses specifically on security for telework involving remote access to organizations' nonpublic computing resources. It provides practical, real world recommendations for securing telework computers' operating systems (OS) and applications, as well as home networks that the computers use. It presents basic recommendations for securing consumer devices used for telework. The document also presents advice on protecting the information stored on telework computers and removable media. In addition, it provides tips on considering the security of a device owned by a third party before deciding whether it should be used for telework.

Technical Guide to Information Security Testing and Assessment - Recommendations of the National Institute of Standards and... Technical Guide to Information Security Testing and Assessment - Recommendations of the National Institute of Standards and Technology (Paperback)
Karen Scarfone, Murugiah Souppaya, Amanda Cody
R366 Discovery Miles 3 660 Ships in 10 - 15 working days

This document is a guide to the basic technical aspects of conducting information security assessments. It presents technical testing and examination methods and techniques that an organization might use as part of an assessment, and offers insights to assessors on their execution and the potential impact they may have on systems and networks. For an assessment to be successful and have a positive impact on the security posture of a system (and ultimately the entire organization), elements beyond the execution of testing and examination must support the technical process. Suggestions for these activities-including a robust planning process, root cause analysis, and tailored reporting-are also presented in this guide.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
What Matters in a Research to Practice…
Christine Grima-Farrell Hardcover R3,627 Discovery Miles 36 270
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet Paperback R399 R374 Discovery Miles 3 740
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, … Paperback  (1)
R330 R305 Discovery Miles 3 050
In Search of Nongqawuse
Treive Nicholas Paperback R350 R328 Discovery Miles 3 280
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, … Paperback R350 R317 Discovery Miles 3 170
Geisha of a Different Kind - Race and…
C Winter Han Hardcover R3,104 Discovery Miles 31 040
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R160 R143 Discovery Miles 1 430
Gun/Shy
Jim Daniels Paperback R476 R440 Discovery Miles 4 400
Winsor & Newton Cotman Watercolour…
R109 R102 Discovery Miles 1 020
Maxwell & Williams Primavera Coupe…
R599 R550 Discovery Miles 5 500

 

Partners