|
![]() |
|||
|
||||
OverviewThe security of data, as shown by several recent high-profile cases, is weak. It is but a question of time before courts begin requiring more thorough steps to be taken--users and courts want data security. This book not only helps IT meet those growing needs, but shows the vendors where they need to improve. Regulations have highlighted an overlying issue of data protection. Data, whether it is financial data, non-public private information, or medical data, needs to be protected from unauthorized external and internal entities at all times. Much valuable data (i.e. customer and patient data) spends most of its lifetime in a storage device--not on computers, servers, or networks. Local failures and outside intruders can change, destroy, or compromise stored data even if the main network is secure: storage requires its own security. This book is a must read for IT personnel responsible for data security and security consultants who perform compliance audits at companies that use storage devices. Full Product DetailsAuthor: Himanshu DwivediPublisher: Pearson Education (US) Imprint: Addison-Wesley Educational Publishers Inc Dimensions: Width: 24.30cm , Height: 3.20cm , Length: 17.90cm Weight: 1.012kg ISBN: 9780321349958ISBN 10: 0321349954 Pages: 560 Publication Date: 24 November 2005 Audience: College/higher education , Tertiary & Higher Education Format: Hardback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsPreface. Acknowledgments. About the Author. 1. Introduction to Storage Security. I. SAN SECURITY. 2. SANs: Fibre Channel Security. 3. SANs: LUN Masking and HBA. 4. SANs: Zone and Switch Security. II. NAS SECURITY. 5. NAS Security. 6. NAS: CIFS Security. 7. NAS: NFS Security. III. ISCSI SECURITY. 8. SANs: iSCSI Security. IV. STORAGE DEFENSES. 9.Securing Fibre Channel SANs. 10. Securing NAS. 11. Securing iSCSI. V. SAN/NAS Policies, Trends, and Case Studies. 12. Compliance, Regulations, and Storage. 13. Auditing and Securing Storage Devices. 14. Storage Security Case Studies. Index.ReviewsAuthor Information"Himanshu Dwivedi is a founding partner of iSEC Partners, a digital security services and products organization. Before forming iSEC Partners (http://www.isecpartners.com), Himanshu was the Technical Director for @stake's San Francisco security practice, a leader in application and network security. His professional experience includes application programming, infrastructure security, and secure product design with an emphasis on storage risk assessment. Himanshu is considered to be an industry expert in storage security. He has been published in major journals, magazines, and news articles regarding his storage security research. Himanshu has been invited to speak at several security and storage conferences in the United States and in Asia, such as Black Hat and Storage Networking World. Although specializing in SAN and NAS security, Himanshu's research includes storage technologies such as Fibre Channel, iSCSI, NFS, and CIFS as well as storage devices such as Fibre Channel switches, host bus adapters, storage controllers, iSCSI initiators, NAS filers, iSNS servers, NAS gateways, and encryption appliances. Himanshu has also written several tools for storage security assessment, including the iSCSI CHAP Password Tester and the Storage Port Scanner. Himanshu currently has a patent pending on a storage design architecture that he co-developed with other professionals (U.S. Patent Serial No. 10/198,728). The patent is a security design for Fibre Channel storage networks. Himanshu has also published two other books, including Storage Networks: The Complete Reference, the ""Security Considerations"" chapter (McGraw-Hill/Osborne), and Implementing SSH: Strategies for Optimizing the Secure Shell (Wiley Publishing). Furthermore, Himanshu has also published two security white papers, including ""Securing Intellectual Property"" (http://www.vsi.org/resources/specs/ippwp310.pdf) and ""Storage Security"" (http://www.atstake.com/research/reports/acrobat/atstake_storage_networks.pdf). A A(c) Copyright Pearson Education. All rights reserved." Tab Content 6Author Website:Countries AvailableAll regions |