Security Controls Evaluation, Testing, and Assessment Handbook


Book Description

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts. - Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts - Shows readers how to implement proper evaluation, testing, assessment procedures and methodologies, with step-by-step walkthroughs of all key concepts - Presents assessment techniques for each type of control, provides evidence of assessment, and includes proper reporting techniques







Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®


Book Description

The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certifica




Operating System Security


Book Description

Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to satisfy these requirements, we see that the complexity of software systems often results in implementation challenges that we are still exploring to this day. However, if a system design does not aim for achieving the secure operating system requirements, then its security features fail to protect the system in a myriad of ways. We also study systems that have been retrofit with secure operating system features after an initial deployment. In all cases, the conflict between function on one hand and security on the other leads to difficult choices and the potential for unwise compromises. From this book, we hope that systems designers and implementors will learn the requirements for operating systems that effectively enforce security and will better understand how to manage the balance between function and security. Table of Contents: Introduction / Access Control Fundamentals / Multics / Security in Ordinary Operating Systems / Verifiable Security Goals / Security Kernels / Securing Commercial Operating Systems / Case Study: Solaris Trusted Extensions / Case Study: Building a Secure Operating System for Linux / Secure Capability Systems / Secure Virtual Machine Systems / System Assurance




IT Security Interviews Exposed


Book Description

Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting work The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008




The CISA Prep Guide


Book Description

This is the first commercially available book to offer CISA study materials The consulting editor, Ronald Krutz, is the co-author of The CISSP Prep Guide (0-471-26802-X) Provides definitions and background on the seven content areas of CISA Includes many sample test questions and explanations of answers More than 10,000 people registered for the CISA exam in 2002 CD-ROM contains annual updates to the exam so the book remains current for a number of years




Emerging Technologies and Information Systems for the Knowledge Society


Book Description

This book, in conjunction with the volume CCIS 19, constitutes the refereed proceedings of theFirst World Summit, WSKS 2008, held in Athens, Greece, in September 2008. The 64 revised full papers presented were carefully reviewed and selected from 286 submissions. The papers are organized in topical sections on social & humanistic computing for the knowledge society; knowledge, learning, education, learning technologies and e-learning for the knowledge society; information technologies for the knowledge society; culture & cultural heritage - technology for culture management - management of tourism and entertainment - tourism networks in the knowledge society; government and democracy for the knowledge society.







Publications


Book Description