Cargando…

Information Security Management Handbook.

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tipton, Harold F.
Otros Autores: Nozaki, Micki Krause
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : CRC Press, 2011.
Edición:6th ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn785727382
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 120405s2011 xx of 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d MERUC  |d IDB  |d OCLCO  |d OCLCF  |d OCLCA  |d OCLCQ  |d RDF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781439853467 
020 |a 1439853460 
029 1 |a AU@  |b 000055806941 
029 1 |a DEBSZ  |b 431059632 
029 1 |a DEBSZ  |b 449266575 
029 1 |a GBVCP  |b 769462596 
029 1 |a GBVCP  |b 793096979 
035 |a (OCoLC)785727382 
050 4 |a QA76.9.A25.I541655 2012 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Tipton, Harold F. 
245 1 0 |a Information Security Management Handbook. 
250 |a 6th ed. 
260 |a Hoboken :  |b CRC Press,  |c 2011. 
300 |a 1 online resource (544 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP(R) Common Body of Knowledge (CBK(R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challen. 
505 0 |a Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements? 
505 8 |a Chapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security 
505 8 |a Chapter 17: Improving Enterprise Security through Predictive AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security 
505 8 |a Chapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security  |x Management  |v Handbooks, manuals, etc. 
650 0 |a Data protection  |v Handbooks, manuals, etc. 
650 6 |a Sécurité informatique  |x Gestion  |v Guides, manuels, etc. 
650 6 |a Protection de l'information (Informatique)  |v Guides, manuels, etc. 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a Nozaki, Micki Krause. 
758 |i has work:  |a [1] Information security management handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYCxFjX3DrPFPtx6TfVwG3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781439853450 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=800925  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL800925 
994 |a 92  |b IZTAP