Information security management handbook. Vol. 4 (2010)
- Record Type:
- Book
- Title:
- Information security management handbook. Vol. 4 (2010)
- Main Title:
- Information security management handbook.
- Further Information:
- Note: Harold F. Tipton, Micki Krause, [editors].
- Other Names:
- Tipton, Harold F
Nozaki, Micki Krause - Contents:
- DOMAIN 1: ACCESS CONTROL; Access Control Administration ; Back to the Future, Paul A. Henry DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY; Communications and Network Security ; Adaptive Threats and Defenses, Sean Price ; Achieving Global Information Systems Transformation (GIST) through Standards: Foundations for Standards-Based Network Visibility via IF-MAP and Beyond, David O'Berry; A Primer on De-mystifying US Government Networks, Samuel Chun, CISSP ; Network Attacks and Countermeasures ; Anti-spam: Bayesian Filtering, George Jahchan DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT; Security Management Concepts and Principles ; Measuring Information Security and Privacy Training and Awareness Effectiveness, Rebecca Herold; Managing Mobile Device Security, E. Eugene Schultz and Gal Shpantzer ; Establishing an Information Security Program for Local Government, Robert Pittman Policies, Standards, Procedures and Guidelines ; A Business Case for ISO 27001 Certification, Tom Carlson and Robert Forbes ; Achieving PCI DSS Compliance: A Compliance Review, Bonnie Goins Pilewski and Christopher A. Pilewski Risk Management ; Leveraging IT Control Frameworks for Compliance, Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT; Rats in the Cellar and Bats in the Attic, Not Enough Depth to My Security, Ken Shaurette; The Outsourcing of IT: Seeing the Big Picture, Foster Henderson; Understanding Information Risk Management, Tom Carlson and Nick Halvorson ; The Sarbanes-OxleyDOMAIN 1: ACCESS CONTROL; Access Control Administration ; Back to the Future, Paul A. Henry DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY; Communications and Network Security ; Adaptive Threats and Defenses, Sean Price ; Achieving Global Information Systems Transformation (GIST) through Standards: Foundations for Standards-Based Network Visibility via IF-MAP and Beyond, David O'Berry; A Primer on De-mystifying US Government Networks, Samuel Chun, CISSP ; Network Attacks and Countermeasures ; Anti-spam: Bayesian Filtering, George Jahchan DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT; Security Management Concepts and Principles ; Measuring Information Security and Privacy Training and Awareness Effectiveness, Rebecca Herold; Managing Mobile Device Security, E. Eugene Schultz and Gal Shpantzer ; Establishing an Information Security Program for Local Government, Robert Pittman Policies, Standards, Procedures and Guidelines ; A Business Case for ISO 27001 Certification, Tom Carlson and Robert Forbes ; Achieving PCI DSS Compliance: A Compliance Review, Bonnie Goins Pilewski and Christopher A. Pilewski Risk Management ; Leveraging IT Control Frameworks for Compliance, Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT; Rats in the Cellar and Bats in the Attic, Not Enough Depth to My Security, Ken Shaurette; The Outsourcing of IT: Seeing the Big Picture, Foster Henderson; Understanding Information Risk Management, Tom Carlson and Nick Halvorson ; The Sarbanes-Oxley Revolution: Hero or Hindrance? Seth Kinnett DOMAIN 4: APPLICATION SECURITY; System Development Controls ; Data Loss Prevention Program, Powell Hamilton; Data Reliability: Trusted Time Stamps, Jeff Stapleton ; Security in the.NET Framework, James D. Murray DOMAIN 5: CRYPTOGRAPHY; Crypto Concepts, Methodologies and Practices; Cryptography: A Unifying Principle in Compliance Programs, Ralph Spencer Poore DOMAIN 6: SECURITY ARCHITECTURE & DESIGN; Principles of Computer and Network Organizations, Architectures and Designs ; Best Practices in Virtualization Security, Shanit Gupta; Everything New Is Old Again, Robert M. Slade DOMAIN 7: OPERATIONS SECURITY; Operations Controls ; A Brief Summary of Warfare and Commercial Entities, Rob Shein; Information Destruction Requirements and Techniques, Ben Rothke DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING; Business Continuity Planning ; Integrated Business Continuity Planning, James Murphy ; CERT/BERT: Community and Business Emergency Response, Carl Jackson DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATION; Major Categories of Computer Crime ; Cyberstalking, Micki Krause Incident Handling ; Is Software Write Blocking a Viable Alternative to Hardware Write Blocking in Computer Forensics? Paul A. Henry DOMAIN 10: PHYSICAL SECURITY; Elements of Physical Security ; Protection of Sensitive Data, Sandy Bacik ; Water Leakage and Flooding, Sandy Bacik ; Site Selection and Facility Design Considerations, Sandy Bacik; An Overview of IP-based Video Surveillance, Leo Kahng … (more)
- Issue Display:
- Volume 4
- Volume:
- 4
- Issue Sort Value:
- 0000-0004-0000-0000
- Edition:
- 6th ed
- Publisher Details:
- Boca Raton : Auerbach Publications
- Publication Date:
- 2010
- Extent:
- 1 online resource (xii, 517 pages), illustrations
- Subjects:
- 005.8
Computer security -- Management -- Handbooks, manuals, etc
Data protection -- Handbooks, manuals, etc
Securité informatique
Protection de l'information (Informatique)
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Computer security -- Management
Data protection
Electronic books
Handbooks and manuals - Languages:
- English
- ISBNs:
- 9781439819036
1439819033 - Related ISBNs:
- 9781420067088
1420067087
9781420090925
1420090925
1439819025
9781439819029
9780849374951
0849374952 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.147877
- Ingest File:
- 01_029.xml