|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910781936803321 |
|
|
Titolo |
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton : , : Auerbach Publications, , 2007-2012 |
|
|
|
|
|
|
|
ISBN |
|
0-429-10792-7 |
1-283-35050-5 |
9786613350503 |
1-4398-5346-0 |
|
|
|
|
|
|
|
|
Edizione |
[6th ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (544 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
TiptonHarold F |
NozakiMicki Krause |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security - Management |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements? |
Chapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security |
Chapter 17: Improving Enterprise Security through Predictive |
|
|
|
|
|
|
|
|
|
|
|
AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security |
Chapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover |
|
|
|
|
|
|
Sommario/riassunto |
|
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP® Common Body of Knowledge (CBK®).This edition updates the benchmark Volume 1 |
|
|
|
|
|
|
|
| |