Front cover; Contributors; Contents; Introduction; Domain 1: Access Control Systems and Methodology; Chapter 1. It Is All about Control; Chapter 2. Controlling FTP: Providing Secured Data Transfers; Chapter 3. The Case for Privacy; Chapter 4. Breaking News: The Latest Hacker Attacks and Defenses; Chapter 5. Counter-Economic Espionage; Domain 2. Telecommunications and Network Security; Chapter 6. What's Not So Simple about SNMP?; Chapter 7. Security for Broadband Internet Access Users; Chapter 8. New Perspectives on VPNs; Chapter 9. An Examination of Firewall Architectures.
Text of Note
Chapter 10. Deploying Host-Based Firewalls across the Enterprise: A Case StudyChapter 11. Overcoming Wireless LAN Security Vulnerabilities; Chapter 12. Voice Security; Chapter 13. Secure Voice Communications (Vol); Chapter 14. Packet Sniffers: Use and Misuse; Chapter 15. ISPs and Denial-of-Service Attacks; Domain 3. Security Management Practices; Chapter 16. The Human Side of Information Security; Chapter 17. Security Management; Chapter 18. The Common Criteria for IT Security Evaluation; Chapter 19. The Security Policy Life Cycle: Functions and Responsibilities.
Text of Note
Chapter 20. Security AssessmentChapter 21. Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards; Chapter 22. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security; Chapter 23. How to Work with a Managed Security Service Provider; Chapter 24. Considerations for Outsourcing Security; Chapter 25. Role and Resonsibilities of the Information Systems Security Officer; Chapter 26. Information Protection: Organization, Roles, and Separation of Duties.
Text of Note
Chapter 27. Organizing for Success: Some Human Resources Issues in Information SecurityChapter 28. Ownership and Custody of Data; Domain 4: Application Program Security; Chapter 29. Application Security; Chapter 30. Certification and Acrreditation Methodology; Chapter 31. A Framework for Certification Testing; Chapter 32. Malicious Code: The Threat, Detection, and Protection; Chapter 33. Malware and Computer Viruses; Domain 5: Cryptography; Chapter 34. Steganography: The Art of Hiding Messages; Chapter 35. An Introduction to Cryptography.
Text of Note
Chapter 36. Hash Algorithms: From Message Digests to SignaturesChapter 37. PKI Registration; Domain 6. Computer, System, and Security Architecture; Chapter 38. Security Infrastructure: Basics of Intrusion Detection Systems; Chapter 39. Firewalls, Tem Percent of the Solution: A Security Architecture Primer; Chapter 40. The Reality of Virtual Computing; Domain 7: Operations Security; Chapter 41. Directory Security; Domain 8: Business Continuity Planning; Chapter 42. The Changing Face of Continuity Planning; Chapter 43. Business Continuity Planning: A Collaborative Approach.
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the tech.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Ingram Content Group
Stock Number
TANDF_183205
OTHER EDITION IN ANOTHER MEDIUM
Title
Information Security Management Handbook, Fourth Edition, Volume 4.
International Standard Book Number
9780849315183
TOPICAL NAME USED AS SUBJECT
Computer security-- Management, Handbooks, manuals, etc.