IT Security Cookbook by Sean Boran

IT Security Cookbook

Publisher: Boran Consulting

This document briefly discusses threat & risk analysis, outlines the ingredients necessary to define a security policy and to provide a framework for deciding how tightly systems need to be secured, outlines policies, processes, structure and responsibilities required in a security organization, presents current security mechanisms, and provides a detailed list of technical guidelines for operating systems, applications and networks used in client/server systems.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Policing Cyber CrimePolicing Cyber Crime
by - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
Book cover: Fundamentals of Media SecurityFundamentals of Media Security
by - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
Book cover: The Security Development LifecycleThe Security Development Lifecycle
by - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.