Cover image for Information security management handbook
Title:
Information security management handbook
Author:
Tipton, Harold F.
ISBN:
9781420090956
Edition:
Sixth edition.
Physical Description:
1 online resource
General Note:
An Auerbach book.
Contents:
part DOMAIN 1: ACCESS CONTROL -- chapter 1 Expanding PKI-Based Access Control Capabilities with Attribute Certificates / chapter 2 Five Components to Identity Management Systems / chapter 3 Security Weaknesses of System and Application Interfaces Used to Process Sensitive Information / part DOMAIN 2: TELECOMMUNICATIONS AND NETWORKS SECURITY -- chapter 4 Mobile Data Security / chapter 5 Enhanced Security rough Open Standards: A Path to a Stronger Global Digital Ecosystem / chapter 6 Web Application Firewalls / chapter 7 Botnets / part DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT -- chapter 8 Collaborating Information Security and Privacy to Create Effective Awareness and Training / chapter 9 Security Information and Event Management (SIEM) Technology / chapter 10 e Insider reat: A View from the Outside / chapter 11 Pod Slurping / chapter 12 The USB (Universal Security Burden) Nightmare: Pod Slurping and Other High Storage Capacity Portable Device Vulnerabilities / chapter 13 Diary of a Security Assessment: “Put at in Your Pipe and Smoke It!” / chapter 14 NERC Compliance: A Compliance Review / part DOMAIN 4: APPLICATION SECURITY -- chapter 15 Mashup Security / chapter 16 Format String Vulnerabilities / chapter 17 Fast Scanning Worms / part DOMAIN 5: CRYPTOGRAPHY -- chapter 18 Message Digests / chapter 19 Quantum Computing: e Rise of the Machine / part DOMAIN 6: SECURITY ARCHITECTURE AND DESIGN -- chapter 20 Information Flow and Covert Channels / chapter 21 Securing Data at Rest: From Smart Phones to Tapes Defining Data at Rest / part DOMAIN 7: OPERATIONS SECURITY -- chapter 22 Validating Tape Backups / part DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING -- chapter 23 Determining Business Unit Priorities in Business Continuity Management / chapter 24 Continuity Program Testing, Maintenance, Training, and Awareness / part DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATION -- chapter 25 Bluesnarfing / chapter 26 Virtualization and Digital Investigations / part DOMAIN 10: PHYSICAL SECURITY -- chapter 27 Halon Fire Suppression Systems / chapter 28 Crime Prevention through Environmental Design. MOLLIE E. KREHNKE -- chapter 29 Data Center Site Selection and Facility Design Considerations
Electronic Access:
Click here to view.
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 546827-1001 QA76.9 .A25 I54165 2007
Searching...

On Order