Muutke küpsiste eelistusi

E-raamat: Securing Converged IP Networks

  • Formaat: 280 pages
  • Ilmumisaeg: 30-May-2006
  • Kirjastus: Auerbach
  • Keel: eng
  • ISBN-13: 9781040169339
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 280 pages
  • Ilmumisaeg: 30-May-2006
  • Kirjastus: Auerbach
  • Keel: eng
  • ISBN-13: 9781040169339
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This work examines how information and communication technology (ICT) impacts the field of technology security and assurance, and provides advice on maintaining content integrity and network assurance in order to protect business uptime and prevent financial loss. The book explains ICT convergence, and offers tools for understanding and mitigating a range of management, operational, and technical risks. Macaulay directs a private-sector security firm. Distributed by Taylor & Francis. Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)

Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.

Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a wide range of ICT security threats and vulnerabilities. Later chapters discuss controls and safeguards in terms of management, as well as, technical, and operational tools that can reduce the likelihood of wide range of risks. It also provides recommendations for managing the assurance, implementation and operation of converged ICT network infrastructures and examines the future of ICT security and assurance under IP convergence.
Preface
Contributors
1. Understanding Internet Protocol (IP) Convergence 1(26)
AUTHOR: Tyson Macaulay
Introduction
3(2)
Strike One Misconception
5(1)
Who Should Read This Book?
6(1)
Assumptions
7(1)
Convergence 101
7(5)
The Convergence Market
12(2)
The Business Drivers of Convergence
14(1)
Cost Drivers
15(3)
Competitive Drivers
18(1)
Regulatory Drivers
19(2)
The Conflicting Priorities of Convergence
21(6)
2. Converged Sensitivity and Enterprise Risk Management 27(26)
AUTHOR: Tyson Macaulay
CONTRIBUTING AUTHOR: Phil Norton
Introduction
29(1)
Target Audience
30(1)
A Whole Greater Than the Sum of Its Parts
31(5)
Enterprise Risk Management and IP Convergence
36(15)
Conclusion
51(2)
3. Information and Communications Technology (ICT) Threats and Vulnerabilities in the All-IP World 53(212)
AUTHOR: Tyson Macaulay
CONTRIBUTING AUTHORS: Pritpal Bhogal and Robert Prudhomme
Introduction
55(2)
Target Audience
57(1)
Descriptive Techniques: Risk Worksheets
58(1)
Use of Qualitative Metrics
59(1)
Threat Lists
60(1)
Sample Worksheet
60(3)
Management Threats
63(23)
Operational Threats
86(41)
Conclusion
127(2)
4. Controls and Safeguards in the All-IP World
129(80)
AUTHOR: Tyson Macaulay
CONTRIBUTING AUTHORS: George McBride and Robert Prudhomme
Introduction
131(4)
Target Audience
135(1)
Descriptive Techniques: Control and Safeguard Worksheets
136(2)
Sample Worksheet
138(2)
Management Controls
140(16)
Operational Controls
156(52)
Conclusion
208(1)
5. Managing Assurance
209(28)
AUTHOR: Tyson Macaulay
Introduction
211(2)
Target Audience
213(14)
Rate Implementation and Testing Regime for Converged Networks
227(4)
Impact Assessment Checklist
231(3)
Conclusion
234(3)
6. What Comes Next?
237(28)
AUTHOR: Tyson Macaulay
CONTRIBUTING AUTHOR: Lee Wagner
Introduction
239(1)
Target Audience
240(1)
Management Controls and Safeguards
241(4)
Operations Controls and Safeguards
245(8)
Technical Controls and Safeguards
253(10)
Conclusion
263(2)
Index 265


Macaulay, Tyson