O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Incident Response and Forensics

I think I subscribe to every information security mailing list. These lists give me varying levels of details on the bugs and other vulnerabilities that can cause security problems within systems or networks. Some are general while others are run by manufacturers and cater to users of that vendor’s product. Most contain information submitted by users while the rest comes from the manufacturer. I know that the number of mailing lists I am on is overkill to most administrators, but the point is that as I work with my clients, I am kept up to date on the latest information.

Yet one day, you are sitting in your cubicle, and you discover a security hole that once publicized, if attacked by a hacker or a disgruntled ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required