1,567 88 14MB
English Pages xlvi, 699 pages + : illustrations ; 24 cm 1 CD-ROM Year 2015
Table of contents :
Part 1: Enterprise Security1. Cryptographic Concepts and Techniques2. Enterprise Storage3. Network and Security Components, Concepts, and Architectures4. Security Control for Hosts5. Application Vulnerabilities and Security Controls Part 2: Risk Management and Incident Response6. Business Influences and Associated Security Risks7. Risk Mitigation Planning, Strategies, and Controls8. Security, Privacy Policies, and Procedures9. Incident Response and Recovery Procedures Part 3: Research, Analysis, and Assessment10. Industry Trends11. Securing the Enterprise12. Assessment Tools and Methods Part 4: Integration of Computing, Communications and Business Disciplines13. Business Unit Collaboration14. Secure Communication and Collaboration15. Security Across the Technology Life Cycle Part 5: Technical Integration of Enterprise Components16. Host, Storage, Network, and Application Integration Into a Secure Enterprise Architecture17. Authentication and Authorization Technologies Glossary