Tipton / Krause Nozaki | Information Security Management Handbook, Sixth Edition, Volume 4 | E-Book | sack.de
E-Book

E-Book, Englisch, 529 Seiten

Tipton / Krause Nozaki Information Security Management Handbook, Sixth Edition, Volume 4

E-Book, Englisch, 529 Seiten

ISBN: 978-1-4398-5886-8
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.

Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.

As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.
Tipton / Krause Nozaki Information Security Management Handbook, Sixth Edition, Volume 4 jetzt bestellen!

Zielgruppe


IT management and staff, including network, system, and information security administration; corporate, law, and accounting libraries; legal and audit professionals.

Weitere Infos & Material


DOMAIN 1: ACCESS CONTROL
Access Control Administration
Back to the Future, Paul A. Henry
DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY
Communications and Network Security
Adaptive Threats and Defenses, Sean Price
Achieving Global Information Systems Transformation (GIST) through Standards: Foundations for Standards-Based Network Visibility via IF-MAP and Beyond, David O'Berry
A Primer on De-mystifying US Government Networks, Samuel Chun, CISSP
Network Attacks and Countermeasures
Anti-spam: Bayesian Filtering, George Jahchan
DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT
Security Management Concepts and Principles
Measuring Information Security and Privacy Training and Awareness Effectiveness, Rebecca Herold
Managing Mobile Device Security, E. Eugene Schultz and Gal Shpantzer
Establishing an Information Security Program for Local Government, Robert Pittman
Policies, Standards, Procedures and Guidelines
A Business Case for ISO 27001 Certification, Tom Carlson and Robert Forbes
Achieving PCI DSS Compliance: A Compliance Review, Bonnie Goins Pilewski and Christopher A. Pilewski
Risk Management
Leveraging IT Control Frameworks for Compliance, Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT
Rats in the Cellar and Bats in the Attic, Not Enough Depth to My Security, Ken Shaurette
The Outsourcing of IT: Seeing the Big Picture, Foster Henderson
Understanding Information Risk Management, Tom Carlson and Nick Halvorson
The Sarbanes-Oxley Revolution: Hero or Hindrance? Seth Kinnett
DOMAIN 4: APPLICATION SECURITY
System Development Controls
Data Loss Prevention Program, Powell Hamilton
Data Reliability: Trusted Time Stamps, Jeff Stapleton
Security in the.NET Framework, James D. Murray
DOMAIN 5: CRYPTOGRAPHY
Crypto Concepts, Methodologies and Practices
Cryptography: A Unifying Principle in Compliance Programs, Ralph Spencer Poore
DOMAIN 6: SECURITY ARCHITECTURE & DESIGN
Principles of Computer and Network Organizations, Architectures and Designs
Best Practices in Virtualization Security, Shanit Gupta
Everything New Is Old Again, Robert M. Slade
DOMAIN 7: OPERATIONS SECURITY
Operations Controls
A Brief Summary of Warfare and Commercial Entities, Rob Shein
Information Destruction Requirements and Techniques, Ben Rothke
DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING
Business Continuity Planning
Integrated Business Continuity Planning, James Murphy
CERT/BERT: Community and Business Emergency Response, Carl Jackson
DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATION
Major Categories of Computer Crime
Cyberstalking, Micki Krause
Incident Handling
Is Software Write Blocking a Viable Alternative to Hardware Write Blocking in Computer Forensics? Paul A. Henry
DOMAIN 10: PHYSICAL SECURITY
Elements of Physical Security
Protection of Sensitive Data, Sandy Bacik
Water Leakage and Flooding, Sandy Bacik
Site Selection and Facility Design Considerations, Sandy Bacik
An Overview of IP-based Video Surveillance, Leo Kahng


Harold F. Tipton, HFT Associates, Villa Park, California, USA
Micki Krause Nozaki, Pacific Life Insurance Company, Newport Beach, California, USA


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.