|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn785727382 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
120405s2011 xx of 000 0 eng d |
040 |
|
|
|a MHW
|b eng
|e pn
|c MHW
|d EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d MERUC
|d IDB
|d OCLCO
|d OCLCF
|d OCLCA
|d OCLCQ
|d RDF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781439853467
|
020 |
|
|
|a 1439853460
|
029 |
1 |
|
|a AU@
|b 000055806941
|
029 |
1 |
|
|a DEBSZ
|b 431059632
|
029 |
1 |
|
|a DEBSZ
|b 449266575
|
029 |
1 |
|
|a GBVCP
|b 769462596
|
029 |
1 |
|
|a GBVCP
|b 793096979
|
035 |
|
|
|a (OCoLC)785727382
|
050 |
|
4 |
|a QA76.9.A25.I541655 2012
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Tipton, Harold F.
|
245 |
1 |
0 |
|a Information Security Management Handbook.
|
250 |
|
|
|a 6th ed.
|
260 |
|
|
|a Hoboken :
|b CRC Press,
|c 2011.
|
300 |
|
|
|a 1 online resource (544 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP(R) Common Body of Knowledge (CBK(R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challen.
|
505 |
0 |
|
|a Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements?
|
505 |
8 |
|
|a Chapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security
|
505 |
8 |
|
|a Chapter 17: Improving Enterprise Security through Predictive AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security
|
505 |
8 |
|
|a Chapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security
|x Management
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Data protection
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Guides, manuels, etc.
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
700 |
1 |
|
|a Nozaki, Micki Krause.
|
758 |
|
|
|i has work:
|a [1] Information security management handbook (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCYCxFjX3DrPFPtx6TfVwG3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 9781439853450
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=800925
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL800925
|
994 |
|
|
|a 92
|b IZTAP
|