Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200541Ii 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    220326s2022    caua    o     001 0 eng d 
019    1305912503|a1306024037 
020    9781484277997|q(electronic bk.) 
020    1484277996|q(electronic bk.) 
024 7  10.1007/978-1-4842-7799-7|2doi 
029 1  AU@|b000071436174 
035    (OCoLC)1306066021|z(OCoLC)1305912503|z(OCoLC)1306024037 
037    9781484277997|bO'Reilly Media 
040    EBLCP|beng|erda|epn|cEBLCP|dYDX|dORMDA|dOCLCO|dGW5XE
       |dEBLCP|dOCLCF|dUKAHL|dOCLCQ|dVLB|dOCLCO|dOCLCL 
049    INap 
082 04 005.8 
082 04 005.8|223 
099    eBook O'Reilly for Public Libraries 
100 1  Viegas, Virgilio,|eauthor. 
245 10 IT security controls :|ba guide to corporate standards and
       frameworks /|cVirgilio Viegas, Oben Kuyucu.|h[O'Reilly 
       electronic resource] 
264  1 Berkeley, CA :|bApress L. P.,|c[2022] 
264  4 |c©2022 
300    1 online resource (369 pages) :|billustrations (some 
       color) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Includes index. 
505 00 |tThe Cybersecurity Challenge --|tInternational security 
       standards --|tInformation security frameworks --|tIT 
       Security technical controls --|tCorporate information 
       security processes and services --|tPeople --|tSecurity 
       metrics --|tCase studies --|tSecurity testing and attack 
       simulation tools. 
520    Use this reference for IT security practitioners to get an
       overview of the major standards and frameworks, and a 
       proposed architecture to meet them. The book identifies 
       and describes the necessary controls and processes that 
       must be implemented in order to secure your organization's
       infrastructure. The book proposes a comprehensive approach
       to the implementation of IT security controls with an 
       easily understandable graphic implementation proposal to 
       comply with the most relevant market standards (ISO 27001,
       NIST, PCI-DSS, and COBIT) and a significant number of 
       regulatory frameworks from central banks across the World 
       (European Union, Switzerland, UK, Singapore, Hong Kong, 
       India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). To 
       connect the book with the real world, a number of well-
       known case studies are featured to explain what went wrong
       with the biggest hacks of the decade, and which controls 
       should have been in place to prevent them. The book also 
       describes a set of well-known security tools available to 
       support you. What You Will Learn Understand corporate IT 
       security controls, including governance, policies, 
       procedures, and security awareness Know cybersecurity and 
       risk assessment techniques such as penetration testing, 
       red teaming, compliance scans, firewall assurance, and 
       vulnerability scans Understand technical IT security 
       controls for unmanaged and managed devices, and perimeter 
       controls Implement security testing tools such as 
       steganography, vulnerability scanners, session hijacking, 
       intrusion detection, and more Who This Book Is For IT 
       security managers, chief information security officers, 
       information security practitioners, and IT auditors will 
       use the book as a reference and support guide to conduct 
       gap analyses and audits of their organizations' IT 
       security controls implementations. 
588    Description based upon print version of record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer security. 
650  2 Computer Security 
650  6 Sécurité informatique. 
650  7 Computer security|2fast 
700 1  Kuyucu, Oben,|eauthor. 
776 08 |iPrint version:|aViegas, Virgilio|tIT Security Controls
       |dBerkeley, CA : Apress L. P.,c2022|z9781484277980 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781484277997/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH40170318 
938    ProQuest Ebook Central|bEBLB|nEBL6938781 
938    YBP Library Services|bYANK|n302806682 
994    92|bJFN