Tipton / Krause Nozaki | Information Security Management Handbook, Sixth Edition, Volume 4 | E-Book | www.sack.de
E-Book

E-Book, Englisch, 529 Seiten

Tipton / Krause Nozaki Information Security Management Handbook, Sixth Edition, Volume 4


6. Auflage 2011
ISBN: 978-1-4398-5886-8
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 529 Seiten

ISBN: 978-1-4398-5886-8
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.

Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.

As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.

Tipton / Krause Nozaki Information Security Management Handbook, Sixth Edition, Volume 4 jetzt bestellen!

Zielgruppe


IT management and staff, including network, system, and information security administration; corporate, law, and accounting libraries; legal and audit professionals.

Weitere Infos & Material


DOMAIN 1: ACCESS CONTROL

Access Control Administration

Back to the Future, Paul A. Henry

DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY

Communications and Network Security

Adaptive Threats and Defenses, Sean Price

Achieving Global Information Systems Transformation (GIST) through Standards: Foundations for Standards-Based Network Visibility via IF-MAP and Beyond, David O'Berry
A Primer on De-mystifying US Government Networks, Samuel Chun, CISSP

Network Attacks and Countermeasures

Anti-spam: Bayesian Filtering, George Jahchan
DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT

Security Management Concepts and Principles

Measuring Information Security and Privacy Training and Awareness Effectiveness, Rebecca Herold
Managing Mobile Device Security, E. Eugene Schultz and Gal Shpantzer

Establishing an Information Security Program for Local Government, Robert Pittman

Policies, Standards, Procedures and Guidelines

A Business Case for ISO 27001 Certification, Tom Carlson and Robert Forbes

Achieving PCI DSS Compliance: A Compliance Review, Bonnie Goins Pilewski and Christopher A. Pilewski

Risk Management

Leveraging IT Control Frameworks for Compliance, Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT
Rats in the Cellar and Bats in the Attic, Not Enough Depth to My Security, Ken Shaurette

The Outsourcing of IT: Seeing the Big Picture, Foster Henderson

Understanding Information Risk Management, Tom Carlson and Nick Halvorson

The Sarbanes-Oxley Revolution: Hero or Hindrance? Seth Kinnett
DOMAIN 4: APPLICATION SECURITY

System Development Controls

Data Loss Prevention Program, Powell Hamilton
Data Reliability: Trusted Time Stamps, Jeff Stapleton

Security in the.NET Framework, James D. Murray

DOMAIN 5: CRYPTOGRAPHY

Crypto Concepts, Methodologies and Practices

Cryptography: A Unifying Principle in Compliance Programs, Ralph Spencer Poore
DOMAIN 6: SECURITY ARCHITECTURE & DESIGN

Principles of Computer and Network Organizations, Architectures and Designs

Best Practices in Virtualization Security, Shanit Gupta
Everything New Is Old Again, Robert M. Slade

DOMAIN 7: OPERATIONS SECURITY

Operations Controls

A Brief Summary of Warfare and Commercial Entities, Rob Shein
Information Destruction Requirements and Techniques, Ben Rothke
DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING

Business Continuity Planning

Integrated Business Continuity Planning, James Murphy

CERT/BERT: Community and Business Emergency Response, Carl Jackson

DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATION

Major Categories of Computer Crime

Cyberstalking, Micki Krause
Incident Handling

Is Software Write Blocking a Viable Alternative to Hardware Write Blocking in Computer Forensics? Paul A. Henry

DOMAIN 10: PHYSICAL SECURITY

Elements of Physical Security

Protection of Sensitive Data, Sandy Bacik

Water Leakage and Flooding, Sandy Bacik

Site Selection and Facility Design Considerations, Sandy Bacik

An Overview of IP-based Video Surveillance, Leo Kahng


Harold F. Tipton, HFT Associates, Villa Park, California, USA
Micki Krause Nozaki, Pacific Life Insurance Company, Newport Beach, California, USA



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.