Skip to:Content
|
Bottom
Cover image for Network security policies and procedures
Title:
Network security policies and procedures
Personal Author:
Series:
Advances in information security
Publication Information:
New York, NY : Springer-Verlag, 2007
Physical Description:
240 p. : ill., digital ; 25 cm.
ISBN:
9780387309378
General Note:
Available online version
Electronic Access:
FullText

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010133246 HF5548.37 F79 2007 Open Access Book Book
Searching...
Searching...
30000010159649 HF5548.37 F79 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization's security and will thus be better equipped to act in a way that forwards an organization's goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.


Table of Contents

Table of Contentsp. v
List of Figuresp. vii
Prefacep. ix
Acknowledgments and Dedicationp. xi
Chapter 1 Information Technology and its Role In the Modern Organizationp. 1
Chapter 2 The Extent of an Organization's Connectivityp. 11
Chapter 3 Network Physical Componentsp. 27
Chapter 4 Legitimate Network Accessp. 35
Chapter 5 Illegitimate Network Accessp. 39
Chapter 6 Encryptionp. 45
Chapter 7 Balanced Scorecardp. 49
Chapter 8 Sarbanes-Oxleyp. 57
Chapter 9 Physical Securityp. 69
Chapter 10 Disaster Recoveryp. 89
Chapter 11 Initial Employee Communicationp. 103
Chapter 12 The Human Elementp. 117
Chapter 13 Email, Instant Messaging and Phishingp. 131
Chapter 14 Network Administrationp. 153
Chapter 15 Network Monitoringp. 159
Chapter 16 Executive Communicationp. 163
Chapter 17 Information Security Awarenessp. 179
Chapter 18 Synthesis and Conclusionp. 195
Chapter 19 Draft Policiesp. 209
Bibliographyp. 225
Indexp. 237
Go to:Top of Page