Essayer OR - Gratuit
Practical Network Security - First Edition 2018
 
 Passez à l'illimité avec Magzter GOLD
Lire Practical Network Security avec plus de 9 000 autres magazines et journaux avec un seul abonnement
Voir le catalogueAbonnez-vous uniquement à Practical Network Security
Annulez à tout moment.
(Aucun engagement) ⓘSi vous n'êtes pas satisfait de votre abonnement, vous pouvez nous contacter par e-mail à help@magzter.com dans les 7 jours suivant la date de début de l'abonnement pour obtenir un remboursement complet. Sans poser de questions, promis ! (Remarque : Non applicable aux achats à l'unité)
Abonnement numérique
Accès instantané ⓘAbonnez-vous maintenant pour commencer instantanément à lire sur le site Web de Magzter, les applications iOS Android et Amazon.
Vérifié Sécurisé
paiement ⓘMagzter est un marchand Stripe vérifié.
Dans ce numéro
First Edition 2018
Practical Network Security Description:
Prepare yourself for any type of audit and minimise security findings
Key Features
It follows a lifecycle approach to information security by understanding:
● Why we need Information security
● How we can implement
● How to operate securely and maintain a secure posture
● How to face audits
Description
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.
With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.
What will you learn
● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.
● Information Security Basics, security concepts in detail, threat
● Securing the Network focuses on network security design aspects and how policies influence network design decisions.
● Secure Operations is all about incorporating security in Network operations.
● Managing Audits is the real test.
Who this book is for
IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.
Table of Contents
1. Basics of Information Security
2. Threat Paradigm
3. Information Security Controls
4. Decoding Policies Standards Procedures & Guidelines
5. Network security design
6. Know your assets
7. Implementing Network Security
8. Secure Change Management
9. Vulnerability and Risk Management
10. Access Control
11. Capacity Management
12. Log Management
13. Network Monitoring
14. Information Security Audit
15. Technical Compliance Audit
16. Penetration Testing
About the Author
Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.
She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.
During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.
She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.Prepare yourself for any type of audit and minimise security findings
Key Features
It follows a lifecycle approach to information security by understanding:
● Why we need Information security
● How we can implement
● How to operate securely and maintain a secure posture
● How to face audits
Description
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.
With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.
What will you learn
● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.
● Information Security Basics, security concepts in detail, threat
● Securing the Network focuses on network security design aspects and how policies influence network design decisions.
● Secure Operations is all about incorporating security in Network operations.
● Managing Audits is the real test.
Who this book is for
IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.
Table of Contents
1. Basics of Information Security
2. Threat Paradigm
3. Information Security Controls
4. Decoding Policies Standards Procedures & Guidelines
5. Network security design
6. Know your assets
7. Implementing Network Security
8. Secure Change Management
9. Vulnerability and Risk Management
10. Access Control
11. Capacity Management
12. Log Management
13. Network Monitoring
14. Information Security Audit
15. Technical Compliance Audit
16. Penetration Testing
About the Author
Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.
She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.
During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.
She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.Prepare yourself for any type of audit and minimise security findings
Key Features
It follows a lifecycle approach to information security by understanding:
● Why we need Information security
● How we can implement
● How to operate securely and maintain a secure posture
● How to face audits
Description
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.
With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.
What will you learn
● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.
● Information Security Basics, security concepts in detail, threat
● Securing the Network focuses on network security design aspects and how policies influence network design decisions.
● Secure Operations is all about incorporating security in Network operations.
● Managing Audits is the real test.
Who this book is for
IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.
Table of Contents
1. Basics of Information Security
2. Threat Paradigm
3. Information Security Controls
4. Decoding Policies Standards Procedures & Guidelines
5. Network security design
6. Know your assets
7. Implementing Network Security
8. Secure Change Management
9. Vulnerability and Risk Management
10. Access Control
11. Capacity Management
12. Log Management
13. Network Monitoring
14. Information Security Audit
15. Technical Compliance Audit
16. Penetration Testing
About the Author
Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.
She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.
During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.
She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.Prepare yourself for any type of audit and minimise security findings
Key Features
It follows a lifecycle approach to information security by understanding:
● Why we need Information security
● How we can implement
● How to operate securely and maintain a secure posture
● How to face audits
Description
This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.
With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.
What will you learn
● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.
● Information Security Basics, security concepts in detail, threat
● Securing the Network focuses on network security design aspects and how policies influence network design decisions.
● Secure Operations is all about incorporating security in Network operations.
● Managing Audits is the real test.
Who this book is for
IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.
Table of Contents
1. Basics of Information Security
2. Threat Paradigm
3. Information Security Controls
4. Decoding Policies Standards Procedures & Guidelines
5. Network security design
6. Know your assets
7. Implementing Network Security
8. Secure Change Management
9. Vulnerability and Risk Management
10. Access Control
11. Capacity Management
12. Log Management
13. Network Monitoring
14. Information Security Audit
15. Technical Compliance Audit
16. Penetration Testing
About the Author
Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.
She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.
During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.
She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.
Titres connexes
  - Journal for Studies in Management and Planning 
  - Journal of Contradicting Results in Science 
  - Journal of Advanced Research in Medicine - Volume 3 - 2016 
  - Journal of Advanced Research in English & Education - Volume 2 - 2017 
  - Journal of Advanced Research in Ayurveda, Yoga, Unani, Siddha and Homeopathy - Volume 1 - 2014 
  - Journal of Advanced Research in Humanities and Social Science - Volume 3 - 2016 
  - Journal of Advanced Research in Dental and Oral Health - Volume 3 - 2018 
  - Journal of advanced research in psychology & psychotherapy - Volume 1 - 2018 
  - Indian Journal of Youth and Adolescent Health - Volume 6 - 2019 
  - Journal of Advanced Research in Aeronautics and Space Science - Volume 3 - 2016 
  - Journal of Advanced Research in Medical Science and Technology - Volume 1 - 2014 
  - Journal of Advanced Research in Medicine - Volume 2 - 2015 
  - Journal of Advanced Research in English & Education - Volume 3 - 2018 
  - Journal of Advanced Research in English & Education - Volume 4 - 2019 
  - International Journal of Healthcare Education & Medical Informatics - Volume 2 - 2015 
  - Journal of Advanced Research in Production and Industrial Engineering Volume 4 2017 
  - Journal of Advanced Research in Civil and Environmental Engineering - Volume 2 - 2015 
  - Journal of Advanced Research in Ayurveda, Yoga, Unani, Siddha and Homeopathy - Volume 4 - 2017 
  - Journal of advanced research in psychology & psychotherapy - Volume 2 - 2019 
  - International Journal of Law, Human Rights and Constitutional Studies - Volume 2 - 2015 
  - Journal of Advanced Research in Dental and Oral Health - Volume 1 - 2016 
  - Epidemiology International - Volume 3 - 2018 
  - Journal of Advanced Research in Ayurveda, Yoga, Unani, Siddha and Homeopathy - Volume 3 - 2016 
  - Journal of Advanced Research in Ayurveda, Yoga, Unani, Siddha and Homeopathy - Volume 5 - 2018 
  - Journal of Advanced Research in Manufacturing, Material Science&Metallurgical Engineering Vol 1 2014 
  - Journal of Advanced Research in Humanities and Social Science - Volume 4 - 2017 
  - Journal Communicable Diseases - Volume 48 - 2016 
  - Journal of Advanced Research in Aeronautics and Space Science - Volume 1 - 2014 
  - Journal of Advanced Research in Ayurveda, Yoga, Unani, Siddha and Homeopathy - Volume 2 - 2015 
  - Recent Advances in Pathology & Laboratory Medicine (RAPL) - Volume 5 -2019 
Catégories populaires
 
 Affaires
 
 Art de vivre
 
 Actualités
 
 Divertissements
 
 Journaux
 
 Maison et Jardin
 
 Mode
 
 Autos, Motos et Véhicules
 
 Intérêt des hommes
 
 Magazines pour hommes
 
 Célébrités
 
 Santé
 
 Jeunesse
 
 Presse féminine
 
 Éducation
 
 Bandes dessinées
 
 Informatique et Mobiles
 
 Art
 
 Sports
 
 Voyage et Plein air
 
 Technologie
 
 Photographie
 
 Science
