Network Security Auditing

Network Security Auditing

By (author)  , By (author) 

List price: US$56.01

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


<P>This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.</P><P>This is the eBook version of the printed book.If the print book includes a CD-ROM, this content is not included within the eBook version.</P><P style="MARGIN: 0px">This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.</P> <P style="MARGIN: 0px">&nbsp;</P> <P style="MARGIN: 0px">Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.</P> <P style="MARGIN: 0px">&nbsp;</P> <P style="MARGIN: 0px">Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products. </P> <P style="MARGIN: 0px">&nbsp;</P> <P style="MARGIN: 0px">This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company&rsquo;s security posture.</P> <UL> <LI> <DIV style="MARGIN: 0px">Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery.</DIV> <LI> <DIV style="MARGIN: 0px">Recognize the foundational roles of security policies, procedures, and standards.</DIV> <LI> <DIV style="MARGIN: 0px">Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting.</DIV> <LI> <DIV style="MARGIN: 0px">Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors.</DIV> <LI> <DIV style="MARGIN: 0px">Evaluate people, processes, and technical security controls through a system-based approach.</DIV> <LI> <DIV style="MARGIN: 0px">Audit security services enabled through Cisco products.</DIV> <LI> <DIV style="MARGIN: 0px">Analyze security policy and compliance requirements for Cisco networks.</DIV> <LI> <DIV style="MARGIN: 0px">Assess infrastructure security and intrusion prevention systems.</DIV> <LI> <DIV style="MARGIN: 0px">Audit network access control and secure remote access systems.</DIV> <LI> <DIV style="MARGIN: 0px">Review security in clients, hosts, and IP communications.</DIV> <LI> <DIV style="MARGIN: 0px">Evaluate the performance of security monitoring and management systems.</DIV></LI></UL> <P style="MARGIN: 0px">This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.</P> <P style="MARGIN: 0px">&nbsp;</P>show more

Product details

  • Electronic book text | 517 pages
  • Cisco Press
  • United States
  • English
  • 158705941X
  • 9781587059414