| 000 | 01511cam a2200337 a 4500 | ||
|---|---|---|---|
| 001 | 2010020583 | ||
| 003 | DLC | ||
| 005 | 20191218020002.0 | ||
| 008 | 100604s2010 inua b 001 0 eng | ||
| 010 | _a 2010020583 | ||
| 015 |
_aGBB037477 _2bnb |
||
| 016 | 7 |
_a015505784 _2Uk |
|
| 020 | _a9781587053528 (pbk.) | ||
| 020 | _a1587053527 (pbk.) | ||
| 035 | _a(OCoLC)ocn457156720 | ||
| 040 |
_aDLC _cDLC _dYDX _dUKM _dBTCTA _dYDXCP _dBWX _dDLC |
||
| 050 | 0 | 0 |
_aTK5105.59 _b.J325 2010 |
| 082 | 0 | 0 |
_a005.8 _222 |
| 100 | 1 |
_aJackson, Chris, _d1973- |
|
| 245 | 1 | 0 |
_aNetwork security auditing / _cChris Jackson. |
| 260 |
_aIndianapolis, IN : _bCisco Press, _cc2010. |
||
| 300 |
_axxiv, 488 p. : _bill. ; _c23 cm. |
||
| 440 | 1 | _aCisco Press networking technology series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 520 | _aThe book begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. It covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO17799/27001, explaining their values, usages, and effective integrations with Cisco security products. | ||
| 590 | _arua 11/10/13 | ||
| 591 | _aLoans | ||
| 650 | 0 |
_aComputer networks _xSecurity measures _xEvaluation. |
|
| 830 | 0 | _aCisco Press networking technology series. | |
| 942 |
_2ddc _cBOOK _03 |
||
| 999 |
_c575 _d575 |
||