04277oam 2200685I 450 991081398080332120200520144314.00-429-11284-X1-283-59665-297866139091071-4398-9315-210.1201/b11802 (CKB)2670000000160871(EBL)877141(OCoLC)781971260(SSID)ssj0000652007(PQKBManifestationID)11398752(PQKBTitleCode)TC0000652007(PQKBWorkID)10637566(PQKB)11246477(Au-PeEL)EBL877141(CaPaEBR)ebr10539448(CaONFJC)MIL390910(OCoLC)124076858(CaSebORM)9781439893159(MiAaPQ)EBC877141(EXLCZ)99267000000016087120180331g20079999 uy 0engur|n|---|||||txtccrInformation security management handbook /edited by Harold F. Tipton, Micki Krause Nozaki6th ed.Boca Raton :Auerbach Publications,2007-1 online resource (495 p.)Information security management handbook ;v. 6"An Auerbach book."1-4665-5910-1 1-4398-9313-6 Includes bibliographical references.Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate ApplicationsChapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving EncryptionChapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back CoverUpdated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SUComputer securityManagementHandbooks, manuals, etcData protectionHandbooks, manuals, etcComputer securityManagementData protection658658/.0558Tipton Harold F1663226Nozaki Micki Krause1663227FlBoTFGFlBoTFGBOOK9910813980803321Information security management handbook4020378UNINA