Cargando…

Information security management handbook. Volume 6 /

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Tipton, Harold F., Nozaki, Micki Krause
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, Fla. : London : Auerbach ; Taylor & Francis [distributor], 2012.
Edición:6th ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn781971260
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 120329s2012 flua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d EBLCP  |d YDXCP  |d CDX  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCA  |d OCLCQ  |d K6U  |d OCLCO  |d RDF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 809977329 
020 |a 9781439893159  |q (electronic bk.) 
020 |a 1439893152  |q (electronic bk.) 
020 |z 9781439893135 
020 |z 1439893136 
024 8 |a 9786613909107 
029 1 |a AU@  |b 000055801017 
029 1 |a DEBSZ  |b 431109265 
029 1 |a DEBSZ  |b 449291650 
029 1 |a DEBSZ  |b 454900317 
029 1 |a GBVCP  |b 775821756 
029 1 |a NZ1  |b 14534175 
035 |a (OCoLC)781971260  |z (OCoLC)809977329 
037 |a 390910  |b MIL 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |2 eflch 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Information security management handbook.  |n Volume 6 /  |c edited by Harold F. Tipton, Micki Krause. 
250 |a 6th ed. 
260 |a Boca Raton, Fla. :  |b Auerbach ;  |a London :  |b Taylor & Francis [distributor],  |c 2012. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "CRC Press." 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications 
505 8 |a Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption 
505 8 |a Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover 
520 |a Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
700 1 |a Tipton, Harold F. 
700 1 |a Nozaki, Micki Krause. 
758 |i has work:  |a 3 Information security management handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFMvvj4ky8rkbfKtwcP4v3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Information security management handbook. Volume 6.  |b 6th ed.  |d Boca Raton, Fla. : Auerbach ; London : Taylor & Francis [distributor], 2012  |z 9781439893135  |w (OCoLC)768072492 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=877141  |z Texto completo 
938 |a Coutts Information Services  |b COUT  |n 23413046  |c 63.99 GBP 
938 |a EBL - Ebook Library  |b EBLB  |n EBL877141 
938 |a EBSCOhost  |b EBSC  |n 440622 
938 |a YBP Library Services  |b YANK  |n 7499932 
994 |a 92  |b IZTAP