Information security management handbook için kapak resmi
Başlık:
Information security management handbook
Yazar:
Tipton, Harold F.
ISBN:
9781439853467

9781466508477
Basım Bilgisi:
Sixth edition.
Fiziksel Tanımlama:
1 online resource
İçerik:
chapter 1 Whitelisting for Endpoint Defense / chapter 2 Whitelisting / chapter 3 RFID and Information Security / chapter 4 Privileged User Management / chapter 5 Privacy in the Age of Social Networking / chapter 6 IF-MAP as a Standard for Security Data Interchange / chapter 7 Understating the Ramifications of IPv6 / chapter 8 Managing Security in Virtual Environments / chapter 9 Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements? / chapter 10 Organization Culture Awareness Will Cultivate Your Information Security Program / chapter 11 Role-Based Information Security Governance: Avoiding the Company Oil Slick / chapter 12 Social Networking Security Exposure / chapter 13 Social Networking, Social Media, and Web 2.0 Security Risks / chapter 14 Applying Adult Education Principles to Security Awareness Programs / chapter 15 Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access / chapter 16 Governance and Risk Management within the Context of Information Security / chapter 17 Improving Enterprise Security through Predictive Analysis / chapter 18 Security Outsourcing / chapter 19 ¡e Effectiveness of Access Management Reviews / chapter 20 Securing SaaS Applications: A Cloud Security Perspective for Application Providers. PRADNYESH RANE -- chapter 21 Attacking RFID Systems / chapter 22 Cryptography: Mathematics vs. Engineering / chapter 23 Cryptographic Message Syntax / chapter 24 An Introduction to Virtualization Security / chapter 25 Warfare and Security: Deterrence and Dissuasion in the Cyber Era / chapter 26 Configuration, Change, and Release Management / chapter 27 Tape Backup Considerations / chapter 28 Productivity vs. Security / chapter 29 Continuity Planning for Small- and Medium-Sized Organizations / chapter 30 ¡e Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry / chapter 31 Data Security and Privacy Legislation / chapter 32 Discovery of Electronically Stored Information / chapter 33 ¡e Layered Defense Model and Perimeter Intrusion Detection
Elektronik Erişim:
Click here to view.
Ayırtma:
Kopya:

Rafta:*

Kütüphane
Materyal Türü
Demirbaş Numarası
Yer Numarası
Durumu/İade Tarihi
Materyal Ayırtma
Arıyor...
E-Kitap 538782-1001 QA76.9 .A25 I54165
Arıyor...

On Order