|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn781971260 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120329s2012 flua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d EBLCP
|d YDXCP
|d CDX
|d OCLCO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d MERUC
|d OCLCA
|d OCLCQ
|d K6U
|d OCLCO
|d RDF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 809977329
|
020 |
|
|
|a 9781439893159
|q (electronic bk.)
|
020 |
|
|
|a 1439893152
|q (electronic bk.)
|
020 |
|
|
|z 9781439893135
|
020 |
|
|
|z 1439893136
|
024 |
8 |
|
|a 9786613909107
|
029 |
1 |
|
|a AU@
|b 000055801017
|
029 |
1 |
|
|a DEBSZ
|b 431109265
|
029 |
1 |
|
|a DEBSZ
|b 449291650
|
029 |
1 |
|
|a DEBSZ
|b 454900317
|
029 |
1 |
|
|a GBVCP
|b 775821756
|
029 |
1 |
|
|a NZ1
|b 14534175
|
035 |
|
|
|a (OCoLC)781971260
|z (OCoLC)809977329
|
037 |
|
|
|a 390910
|b MIL
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|2 eflch
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information security management handbook.
|n Volume 6 /
|c edited by Harold F. Tipton, Micki Krause.
|
250 |
|
|
|a 6th ed.
|
260 |
|
|
|a Boca Raton, Fla. :
|b Auerbach ;
|a London :
|b Taylor & Francis [distributor],
|c 2012.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a "CRC Press."
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
|
505 |
8 |
|
|a Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
|
505 |
8 |
|
|a Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
|
520 |
|
|
|a Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
700 |
1 |
|
|a Tipton, Harold F.
|
700 |
1 |
|
|a Nozaki, Micki Krause.
|
758 |
|
|
|i has work:
|a 3 Information security management handbook (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFMvvj4ky8rkbfKtwcP4v3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Information security management handbook. Volume 6.
|b 6th ed.
|d Boca Raton, Fla. : Auerbach ; London : Taylor & Francis [distributor], 2012
|z 9781439893135
|w (OCoLC)768072492
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=877141
|z Texto completo
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 23413046
|c 63.99 GBP
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL877141
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 440622
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7499932
|
994 |
|
|
|a 92
|b IZTAP
|