Front cover; Contributors; Contents; Introduction; Domain 1: Access Control Systems and Methodology; Chapter 1. It Is All about Control; Chapter 2. Controlling FTP: Providing Secured Data Transfers; Chapter 3. The Case for Privacy; Chapter 4. Breaking News: The Latest Hacker Attacks and Defenses; Chapter 5. Counter-Economic Espionage; Domain 2. Telecommunications and Network Security; Chapter 6. What's Not So Simple about SNMP?; Chapter 7. Security for Broadband Internet Access Users; Chapter 8. New Perspectives on VPNs; Chapter 9. An Examination of Firewall Architectures.
متن يادداشت
Chapter 10. Deploying Host-Based Firewalls across the Enterprise: A Case StudyChapter 11. Overcoming Wireless LAN Security Vulnerabilities; Chapter 12. Voice Security; Chapter 13. Secure Voice Communications (Vol); Chapter 14. Packet Sniffers: Use and Misuse; Chapter 15. ISPs and Denial-of-Service Attacks; Domain 3. Security Management Practices; Chapter 16. The Human Side of Information Security; Chapter 17. Security Management; Chapter 18. The Common Criteria for IT Security Evaluation; Chapter 19. The Security Policy Life Cycle: Functions and Responsibilities.
متن يادداشت
Chapter 20. Security AssessmentChapter 21. Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards; Chapter 22. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security; Chapter 23. How to Work with a Managed Security Service Provider; Chapter 24. Considerations for Outsourcing Security; Chapter 25. Role and Resonsibilities of the Information Systems Security Officer; Chapter 26. Information Protection: Organization, Roles, and Separation of Duties.
متن يادداشت
Chapter 27. Organizing for Success: Some Human Resources Issues in Information SecurityChapter 28. Ownership and Custody of Data; Domain 4: Application Program Security; Chapter 29. Application Security; Chapter 30. Certification and Acrreditation Methodology; Chapter 31. A Framework for Certification Testing; Chapter 32. Malicious Code: The Threat, Detection, and Protection; Chapter 33. Malware and Computer Viruses; Domain 5: Cryptography; Chapter 34. Steganography: The Art of Hiding Messages; Chapter 35. An Introduction to Cryptography.
متن يادداشت
Chapter 36. Hash Algorithms: From Message Digests to SignaturesChapter 37. PKI Registration; Domain 6. Computer, System, and Security Architecture; Chapter 38. Security Infrastructure: Basics of Intrusion Detection Systems; Chapter 39. Firewalls, Tem Percent of the Solution: A Security Architecture Primer; Chapter 40. The Reality of Virtual Computing; Domain 7: Operations Security; Chapter 41. Directory Security; Domain 8: Business Continuity Planning; Chapter 42. The Changing Face of Continuity Planning; Chapter 43. Business Continuity Planning: A Collaborative Approach.
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the tech.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Ingram Content Group
شماره انبار
TANDF_183205
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Information Security Management Handbook, Fourth Edition, Volume 4.
شماره استاندارد بين المللي کتاب و موسيقي
9780849315183
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security-- Management, Handbooks, manuals, etc.