000 01511cam a2200337 a 4500
001 2010020583
003 DLC
005 20191218020002.0
008 100604s2010 inua b 001 0 eng
010 _a 2010020583
015 _aGBB037477
_2bnb
016 7 _a015505784
_2Uk
020 _a9781587053528 (pbk.)
020 _a1587053527 (pbk.)
035 _a(OCoLC)ocn457156720
040 _aDLC
_cDLC
_dYDX
_dUKM
_dBTCTA
_dYDXCP
_dBWX
_dDLC
050 0 0 _aTK5105.59
_b.J325 2010
082 0 0 _a005.8
_222
100 1 _aJackson, Chris,
_d1973-
245 1 0 _aNetwork security auditing /
_cChris Jackson.
260 _aIndianapolis, IN :
_bCisco Press,
_cc2010.
300 _axxiv, 488 p. :
_bill. ;
_c23 cm.
440 1 _aCisco Press networking technology series
504 _aIncludes bibliographical references and index.
520 _aThe book begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. It covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO17799/27001, explaining their values, usages, and effective integrations with Cisco security products.
590 _arua 11/10/13
591 _aLoans
650 0 _aComputer networks
_xSecurity measures
_xEvaluation.
830 0 _aCisco Press networking technology series.
942 _2ddc
_cBOOK
_03
999 _c575
_d575