Document Type
|
:
|
BL
|
Record Number
|
:
|
1032048
|
Doc. No
|
:
|
b786418
|
Title & Author
|
:
|
Information security management handbook.\ Harold F. Tipton, Micki Krause, editors.
|
Edition Statement
|
:
|
4th edition.
|
Publication Statement
|
:
|
Boca Raton :: Auerbach Publications,, [2003]
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
1420072412
|
|
:
|
: 9781420072419
|
|
:
|
9780849315183
|
Notes
|
:
|
Includes index.
|
Contents
|
:
|
Front cover; Contributors; Contents; Introduction; Domain 1: Access Control Systems and Methodology; Chapter 1. It Is All about Control; Chapter 2. Controlling FTP: Providing Secured Data Transfers; Chapter 3. The Case for Privacy; Chapter 4. Breaking News: The Latest Hacker Attacks and Defenses; Chapter 5. Counter-Economic Espionage; Domain 2. Telecommunications and Network Security; Chapter 6. What's Not So Simple about SNMP?; Chapter 7. Security for Broadband Internet Access Users; Chapter 8. New Perspectives on VPNs; Chapter 9. An Examination of Firewall Architectures.
|
|
:
|
Chapter 10. Deploying Host-Based Firewalls across the Enterprise: A Case StudyChapter 11. Overcoming Wireless LAN Security Vulnerabilities; Chapter 12. Voice Security; Chapter 13. Secure Voice Communications (Vol); Chapter 14. Packet Sniffers: Use and Misuse; Chapter 15. ISPs and Denial-of-Service Attacks; Domain 3. Security Management Practices; Chapter 16. The Human Side of Information Security; Chapter 17. Security Management; Chapter 18. The Common Criteria for IT Security Evaluation; Chapter 19. The Security Policy Life Cycle: Functions and Responsibilities.
|
|
:
|
Chapter 20. Security AssessmentChapter 21. Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards; Chapter 22. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security; Chapter 23. How to Work with a Managed Security Service Provider; Chapter 24. Considerations for Outsourcing Security; Chapter 25. Role and Resonsibilities of the Information Systems Security Officer; Chapter 26. Information Protection: Organization, Roles, and Separation of Duties.
|
|
:
|
Chapter 27. Organizing for Success: Some Human Resources Issues in Information SecurityChapter 28. Ownership and Custody of Data; Domain 4: Application Program Security; Chapter 29. Application Security; Chapter 30. Certification and Acrreditation Methodology; Chapter 31. A Framework for Certification Testing; Chapter 32. Malicious Code: The Threat, Detection, and Protection; Chapter 33. Malware and Computer Viruses; Domain 5: Cryptography; Chapter 34. Steganography: The Art of Hiding Messages; Chapter 35. An Introduction to Cryptography.
|
|
:
|
Chapter 36. Hash Algorithms: From Message Digests to SignaturesChapter 37. PKI Registration; Domain 6. Computer, System, and Security Architecture; Chapter 38. Security Infrastructure: Basics of Intrusion Detection Systems; Chapter 39. Firewalls, Tem Percent of the Solution: A Security Architecture Primer; Chapter 40. The Reality of Virtual Computing; Domain 7: Operations Security; Chapter 41. Directory Security; Domain 8: Business Continuity Planning; Chapter 42. The Changing Face of Continuity Planning; Chapter 43. Business Continuity Planning: A Collaborative Approach.
|
Abstract
|
:
|
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the tech.
|
Subject
|
:
|
Computer security-- Management, Handbooks, manuals, etc.
|
Subject
|
:
|
Data protection, Handbooks, manuals, etc.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Industrial Management.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Management Science.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Management.
|
Subject
|
:
|
BUSINESS ECONOMICS-- Organizational Behavior.
|
Subject
|
:
|
Computer security-- Management.
|
Subject
|
:
|
Data protection.
|
Dewey Classification
|
:
|
658/.0558
|
LC Classification
|
:
|
QA76.9.A25
|
Added Entry
|
:
|
Nozaki, Micki Krause
|
|
:
|
Tipton, Harold F.
|