- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Currently out of stock.
available for shipping or prepaid pickup only
Other titles in the Cisco Press Networking Technology series:
Network Security Auditing (Networking Technology: Security Networking Technology: Secur)by Chris Jackson
Synopses & Reviews
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.
Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.
This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company’s security posture.
This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
Book News Annotation:
Intended for beginner to intermediate network administrators, this volume examines the fundamentals of network security auditing and presents Cisco product solutions to common security tasks and infrastructure needs. The work begins by outlining the basic principles of network auditing and proceeds through discussions of such topics as security governance and standards, auditing tools and techniques, infrastructure security, access control and secure remote access. Networking diagrams, illustrations and code samples are provided throughout and while examples in this volume are Cisco hardware and software specific, the general principles of network auditing and security are universally applicable. Jackson is a Cisco security expert and holds a CCIE certification. Annotation ©2011 Book News, Inc., Portland, OR (booknews.com)
About the Author
Christopher L. Jackson, CCIE No. 6256, is a security technical solutions architect in the U.S. Channels organization with Cisco and is focused on developing security consulting practices in the Cisco partner community. Throughout his career in internetworking, Chris has built secure networks that map to a strong security policy for a large number of organizations including UPS, GE, and Sprint. Chris is an active speaker on security for Cisco through TechwiseTV, conferences, and web casts. He has authored numerous whitepapers and is responsible for a number of Cisco initiatives to build stronger security partners through security practice building.
Chris is a highly certified individual with dual CCIEs (Routing and Switching & Security), CISSP, ISA, seven SANS GIAC certifications (GSNA, GCIH, GCFW, GCIA, GCUX, GCWN, and GSEC), and ITIL V3. Chris also holds a bachelors degree in business administration from McKendree College. Residing in Bradenton, Florida, Chris enjoys tinkering with his home automation system and playing with his ever-growing collection of electronic gadgets. His
wife Barbara and two children Caleb and Sydney are the joy of his life and proof that not everything has to plug into a wall outlet to be fun.
Table of Contents
Part I: Principles of Auditing
Chap 1: Principles of Auditing
Chap 2: Regulatory Compliance and Auditing Frameworks
Chap 3: Auditing Tools
Part II: Mapping Cisco Security Controls to Auditing Requirements
Chap 4: Cisco Security Solutions Domains
Chap 5: Policy and Compliance
Chap 6: Infrastructure Security
Chap 7: Intrusion Prevention
Chap 8: Role Based Access Control
Chap 9: Secure Remote Access
Chap 10: Secure Clients and Hosts
Chap 11: Secure IP Communications
Chap 12: Monitoring and Management
Part III: Setting Up Auditing Programs
Chap 13: Developing an auditing program
What Our Readers Are Saying
Computers and Internet » Internet » General