Verlag: National Aeronautics and Space Administration, Washington DC, 1980
Anbieter: Ground Zero Books, Ltd., Silver Spring, MD, USA
Stapled in upper left corner. Zustand: Good. Xerox copy of Draft Instruction. 5, [1] pages. The Information Resources Management Division was the responsible Office in NASA for this instruction. This was intended to replace NASA Management Instruction, NMI 2410.7, Assuring Security and Integrity of NASA Data Processing, July 13, 1979. From the internet version 7C establishes policy and responsibilities for ensuring appropriate levels of security and integrity for NASA automated information processing installations, systems, data, and related resources; and constitutes the NASA Automated Information Security (AIS) Program. [Additional NASA policy can be found in the NASA On-Line Directives Information System (NODIS) Library . This site provides quick access to all of NASA's Policy Directives (NPD's) {i.e., formerly NASA Management Instructions (NMI's)}, NASA's Procedures & Guidelines (NPG's) {i.e., formerly NASA Handbooks (NHB's)} and NASA's Policy Charters (NPC's).] This instruction, when finalized, would apply to NASA Headquarters and field installations. It included all unclassified automated information systems and information resources used to support the management and technical activities of NASA, contractor, or research facility. Information resources not under NASA management cognizance, the utilization of which was incidental to services provided to NASA, were not generally included. NASA center could elect, on an individual basis, to include information resources exempted by this definition. Telecommunications security policy was the responsibility of the Office of Space Tracing and Data Systems and was not addressed.
Sprache: Englisch
Verlag: Cham, Springer International Publishing., 2013
ISBN 10: 3319014323 ISBN 13: 9783319014326
Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
2013. 16 x 24 cm. VIII, 187 S. VIII, 187 p. 62 illus. Hardcover. Sprache: Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2013
ISBN 10: 3319014323 ISBN 13: 9783319014326
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Okt 2013, 2013
ISBN 10: 3319014323 ISBN 13: 9783319014326
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 196 pp. Englisch.
EUR 11,93
Anzahl: 1 verfügbar
In den WarenkorbZustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.