Information security management handbook. Volume 3 (©2009)
- Record Type:
- Book
- Title:
- Information security management handbook. Volume 3 (©2009)
- Main Title:
- Information security management handbook.
- Further Information:
- Note: Edited by Harold F. Tipton, Micki Krause.
- Other Names:
- Tipton, Harold F
Krause, Micki - Contents:
- Domain 1 Access Control Expanding PKI-Based Access Control Capabilities with Attribute Certificates, A. Golod Five Components to Identity Management Systems, K. Castellow Security Weaknesses of System and Application Interfaces Used to Process Sensitive Information, S. M. Price Domain 2 Telecommunications and Network Security Mobile Data Security, G. G. McBride Integrated Security through Open Standards: A Path to Enhanced Network Visibility, D. O’Berry Web Application Firewalls, G. J. Jahchan Botnets, R. M. Slade Domain 3 Information Security and Risk Management Collaborating Information Security and Privacy to Create Effective Awareness and Training, R. Herold Security Information and Event Management (SIEM) Technology, E. E. Schultz The Insider Threat: A View from The Outside, T. Fitzgerald Pod Slurping, B. Rothke The USB (Universal Serial Bus) Nightmare: Pod Slurping and other High Storage Capacity Portable Device Vulnerabilities, K. F. Belva Diary of a Security Assessment: "Put that In Your Pipe and Smoke It!", K. M. Shaurette NERC Compliance: A Compliance Review, B. G. Pilewski and C. A. Pilewski Domain 4 Application Security Mashup Security, M. Paul Format String Vulnerabilities, M. Paul Fast Scanning Worms, P. A. Henry Domain 5 Cryptography Message Digests, R. S. Poore Quantum Computing: The Rise of the Machine, R. Fussell Domain 6 Security Architecture & Design Information Flow and Covert Channels, S. M. Price Securing Data at Rest: From Smart phones to TapesDomain 1 Access Control Expanding PKI-Based Access Control Capabilities with Attribute Certificates, A. Golod Five Components to Identity Management Systems, K. Castellow Security Weaknesses of System and Application Interfaces Used to Process Sensitive Information, S. M. Price Domain 2 Telecommunications and Network Security Mobile Data Security, G. G. McBride Integrated Security through Open Standards: A Path to Enhanced Network Visibility, D. O’Berry Web Application Firewalls, G. J. Jahchan Botnets, R. M. Slade Domain 3 Information Security and Risk Management Collaborating Information Security and Privacy to Create Effective Awareness and Training, R. Herold Security Information and Event Management (SIEM) Technology, E. E. Schultz The Insider Threat: A View from The Outside, T. Fitzgerald Pod Slurping, B. Rothke The USB (Universal Serial Bus) Nightmare: Pod Slurping and other High Storage Capacity Portable Device Vulnerabilities, K. F. Belva Diary of a Security Assessment: "Put that In Your Pipe and Smoke It!", K. M. Shaurette NERC Compliance: A Compliance Review, B. G. Pilewski and C. A. Pilewski Domain 4 Application Security Mashup Security, M. Paul Format String Vulnerabilities, M. Paul Fast Scanning Worms, P. A. Henry Domain 5 Cryptography Message Digests, R. S. Poore Quantum Computing: The Rise of the Machine, R. Fussell Domain 6 Security Architecture & Design Information Flow and Covert Channels, S. M. Price Securing Data at Rest: From Smart phones to Tapes Defining Data at Rest, S. Chun and L. Kahng Domain 7 Operations Security Validating Tape Backups, S. Bacik Domain 8 Business Continuity Planning and Disaster Recovery Planning Determining Business Unit Priorities in Business Continuity Management, K. Henry Continuity Program Testing, Maintenance, Training, and Awareness, C. Jackson Domain 9 Legal Regulations, Compliance, and Investigation Bluesnarfing, M. Paul Virtualization and Digital Investigations, M. K. Rogers and S. C. Leshney Domain 10 Physical Security Halon Fire Suppression Systems, C. Hare Crime Prevention through Environmental Design, M. E. Krehnke Data Center Site Selection and Facility Design Considerations, S. Bacik Index … (more)
- Issue Display:
- Volume 3
- Volume:
- 3
- Issue Sort Value:
- 0000-0003-0000-0000
- Edition:
- 6th ed
- Publisher Details:
- Boca Raton, Fla London : CRC
- Publication Date:
- 2009
- Copyright Date:
- 2009
- Extent:
- 1 online resource (xviii, 419 pages), illustrations, maps
- Subjects:
- 005.8
Computer security -- Management
Data protection
Computer security -- Management
Data protection
Electronic books - Languages:
- English
- ISBNs:
- 1322622477
9781322622477
9781420090956 - Related ISBNs:
- 142009095X
9781420090925 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.148057
- Ingest File:
- 01_050.xml