Information security management handbook. Volume 2 için kapak resmi
Başlık:
Information security management handbook. Volume 2
Yazar:
Tipton, Harold F.
ISBN:
9780203005552

9781135484002

9781135483951

9781135483999
Basım Bilgisi:
Fifth edition.
Fiziksel Tanımlama:
1 online resource (xxi, 578 pages)
Genel Not:
Previous ed.: 2001.
İçerik:
chapter Domain 1: Access Control Systems and Methodology -- chapter 1 Insight into Intrusion Prevention Systems -- chapter 2 Blended Threat Analysis: Passwords and Policy -- chapter 3 Identity Theft -- chapter Domain 2: Telecommunications and Network Security -- chapter 4 Network Security Overview -- chapter 5 Storage Area Networks Security Protocols and Mechanisms -- chapter 6 Putting Security in the Transport: TLS -- chapter 7 Access Control Using RADIUS -- chapter 8 An Examination of Firewall Architectures: II -- chapter 9 Voice-over-IP Security Issues -- chapter 10 Secure Web Services: Holes and Fillers -- chapter 11 Insecurity by Proxy -- chapter 12 Wireless Security -- chapter Domain 3: Security Management Practices -- chapter 13 Validating Your Business Partners -- chapter 14 Change That Attitude: The ABCs of a Persuasive Security Awareness Program -- chapter 15 Annual Security Awareness Briefing for the End User -- chapter 16 The Role of Information Security in the Enterprise Risk Management Structure -- chapter 17 Establishing an E-Mail Retention Policy: Preventing Potential Legal Nightmares -- chapter 18 When Trust Goes Beyond the Border: Moving Your Development Work Offshore -- chapter 19 Ten Steps to Effective Web-Based Security Policy Development and Distribution -- chapter 20 Understanding CRM -- chapter Domain 4: Application Program Security -- chapter 21 Cross-Site Scripting (XSS) -- chapter 22 Stack-Based Buffer Overflows -- chapter 23 Incorporating HIPAA Security Requirements into an Enterprise Security Program -- chapter 24 Preventing SQL Injection Security Vulnerabilities through Data Sanitization -- chapter 25 Net-Based Malware Detection: A Comparison with Intrusion Detection Models -- chapter Domain 5: Cryptography -- chapter 26 Cryptographic Key Management Concepts -- chapter Domain 6: Computer, System, and Security Architecture -- chapter 27 Creating a Secure Architecture -- chapter 28 Common Models for Architecting an Enterprise Security Capability -- chapter Domain 7: Operations Security -- chapter 29 WLAN Security Update -- chapter 30 Operations Security Abuses -- chapter 31 Patch Management 101: It Just Makes Good Sense! -- chapter 31 Patch Management 101: It Just Makes Good Sense! -- chapter 32 Security Patch Management: The Process -- chapter 33 Best Practice in Contingency Planning or Contingency Planning Program Maturity -- chapter Domain 9: Law, Investigation, and Ethics -- chapter 34 Jurisdictional Issues in Global Transmissions -- chapter 35 An Emerging Information Security Minimum Standard of Due Care -- chapter 36 ISPs and Accountability -- chapter 37 Spyware, Spooks, and Cyber-Goblins -- chapter 38 Honeypot Essentials -- chapter 39 Obscuring URLs -- chapter Domain 10: Physical Security -- chapter 40 Personnel Security Screening -- chapter 41 Workplace Violence: Event Characteristics and Prevention.
Elektronik Erişim:
Click here to view.
Ayırtma:
Kopya:

Rafta:*

Kütüphane
Materyal Türü
Demirbaş Numarası
Yer Numarası
Durumu/İade Tarihi
Materyal Ayırtma
Arıyor...
E-Kitap 546290-1001 QA76.9 .A25 I54 2005
Arıyor...

On Order