0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (7)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

BIOS Protection Guidelines - Recommendations of the National Institute of Standards and Technology (Special Publication... BIOS Protection Guidelines - Recommendations of the National Institute of Standards and Technology (Special Publication 800-147) (Paperback)
William Polk, Andrew Regenscheid, Murugiah Souppaya
R304 Discovery Miles 3 040 Ships in 10 - 15 working days

This National Institute of Standards and Technology Special Publication 800-147 "BIOS Protection Guidelines" document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS's unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization -either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware). As used in this publication, the term BIOS refers to conventional BIOS, Extensible Firmware Interface (EFI) BIOS, and Unified Extensible Firmware Interface (UEFI) BIOS. This document applies to system BIOS firmware (e.g., conventional BIOS or UEFI BIOS) stored in the system flash memory of computer systems, including portions that may be formatted as Option ROMs. However, it does not apply to Option ROMs, UEFI drivers, and firmware stored elsewhere in a computer system. While this document focuses on current and future x86 and x64 client platforms, the controls and procedures are independent of any particular system design. Likewise, although the guide is oriented toward enterprise-class platforms, the necessary technologies are expected to migrate to consumer-grade systems over time. Future efforts may look at boot firmware security for enterprise server platforms.

Guidelines for Securing Wireless Local Area Networks (WLANS) (Paperback): Karen Scarfone, U. S. Department of Commerce,... Guidelines for Securing Wireless Local Area Networks (WLANS) (Paperback)
Karen Scarfone, U. S. Department of Commerce, Murugiah Souppaya
R345 Discovery Miles 3 450 Ships in 10 - 15 working days

The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating and strengthening their key recommendations.

Guidelines for Securing Wireless Local Area Networks (WLANs) - Recommendations of the National Institute of Standards and... Guidelines for Securing Wireless Local Area Networks (WLANs) - Recommendations of the National Institute of Standards and Technology (Special Publication 800-153) (Paperback)
Karen Scarfone, Murugiah Souppaya
R347 Discovery Miles 3 470 Ships in 10 - 15 working days

The National Institute of Standards and Technology Special Publication 800-153 provides information on the Guidelines for Securing Wireless Local Area Networks (WLANs). A wireless local area network (WLAN) is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The security of each WLAN is heavily dependent on how well each WLAN component-including client devices, APs, and wireless switches-is secured throughout the WLAN lifecycle, from initial WLAN design and deployment through ongoing maintenance and monitoring. The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating and strengthening their key recommendations.

Guide to Computer Security Log Management - Recommendations of the National Institute of Standards and Technology: Special... Guide to Computer Security Log Management - Recommendations of the National Institute of Standards and Technology: Special Publication 800-92 (Paperback)
Murugiah Souppaya, Karen Kent
R316 Discovery Miles 3 160 Ships in 10 - 15 working days

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL's research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. Topics covered include an Introduction to Computer Log Management, Log management Infrastructure, Log Management Planning, and Log Management Operational Processes

Guide to Securing Microsoft Windows XP Systems for IT Professionals - A NIST Security Configuration Checklist (Paperback):... Guide to Securing Microsoft Windows XP Systems for IT Professionals - A NIST Security Configuration Checklist (Paperback)
Murugiah Souppaya, Paul M. Johnson, Karen Scarfone
R352 Discovery Miles 3 520 Ships in 10 - 15 working days

This guide provides detailed information about the security of Windows XP, security configuration guidelines for popular applications, and security configuration guidelines for the Windows XP operating system. The guide documents the methods that system administrators can use to implement each security setting recommended. The principal goal of the document is to recommend and explain tested, secure settings for Windows XP workstations with the objective of simplifying the administrative burden of improving the security of Windows XP systems in five types of environments: SOHO, enterprise, and three custom environments, specialized security-limited functionality, legacy, and Federal Desktop Core Configuration (FDCC).

User's Guide to Securing External Devices for Telework and Remote Access (Paperback): Karen Scarfone, Murugiah Souppaya,... User's Guide to Securing External Devices for Telework and Remote Access (Paperback)
Karen Scarfone, Murugiah Souppaya, U. S. Department of Commerce
R455 Discovery Miles 4 550 Ships in 10 - 15 working days

This publication helps teleworkers secure the external devices they use for telework, such as personally owned and third-party privately owned desktop and laptop computers and consumer devices (e.g., cell phones, personal digital assistants PDA]). The document focuses specifically on security for telework involving remote access to organizations' nonpublic computing resources. It provides practical, real world recommendations for securing telework computers' operating systems (OS) and applications, as well as home networks that the computers use. It presents basic recommendations for securing consumer devices used for telework. The document also presents advice on protecting the information stored on telework computers and removable media. In addition, it provides tips on considering the security of a device owned by a third party before deciding whether it should be used for telework.

Technical Guide to Information Security Testing and Assessment - Recommendations of the National Institute of Standards and... Technical Guide to Information Security Testing and Assessment - Recommendations of the National Institute of Standards and Technology (Paperback)
Karen Scarfone, Murugiah Souppaya, Amanda Cody
R350 Discovery Miles 3 500 Ships in 10 - 15 working days

This document is a guide to the basic technical aspects of conducting information security assessments. It presents technical testing and examination methods and techniques that an organization might use as part of an assessment, and offers insights to assessors on their execution and the potential impact they may have on systems and networks. For an assessment to be successful and have a positive impact on the security posture of a system (and ultimately the entire organization), elements beyond the execution of testing and examination must support the technical process. Suggestions for these activities-including a robust planning process, root cause analysis, and tailored reporting-are also presented in this guide.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cadac Mantles (300 CP D/T) (3 / Blister…
R110 Discovery Miles 1 100
Top Five
Rosario Dawson, Cedric The Entertainer, … Blu-ray disc R40 Discovery Miles 400
Bantex @School Jumbo Triangular Pencils…
R36 Discovery Miles 360
Sony PlayStation 5 Slim Console (Glacier…
R15,299 Discovery Miles 152 990
Sony PULSE Explore Wireless Earbuds
R4,999 R4,749 Discovery Miles 47 490
Shield Sheen Interior Wipes (Pack of 20…
R47 Discovery Miles 470
Little Big Paw Turkey Wet Dog Food Tin…
R815 Discovery Miles 8 150
Alva 3 Panel Luxurious Infrared Radiant…
R1,699 R1,302 Discovery Miles 13 020
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Clare - The Killing Of A Gentle Activist
Christopher Clark Paperback R360 R309 Discovery Miles 3 090

 

Partners