LEADER 01210nas 2200397-a 450 001 9910145225403321 005 20240413030911.0 035 $a(CKB)991042745765260 035 $a(CONSER)sn-84001799- 035 $a(DE-599)ZDB2158617-2 035 $a(EXLCZ)99991042745765260 100 $a19841108b1984200u --- a 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aPalynos $enewsletter of the International Federation of Palynological Societies 210 $a[Tempe, Ariz.] $cThe Federation$d[1984?- 215 $a1 online resource 300 $aTitle from caption. 311 08$aPrint version: Palynos : 0256-1670 (DLC)sn 84001799 (OCoLC)11361692 531 0 $aPalynos 606 $aPalynology$vPeriodicals 606 $aPalynologie$2gtt 606 $aPalynology$2fast$3(OCoLC)fst01051826 608 $aPeriodicals.$2fast 615 0$aPalynology 615 17$aPalynologie. 615 7$aPalynology. 676 $a581 712 02$aInternational Federation of Palynological Societies. 906 $aJOURNAL 912 $a9910145225403321 920 $aexl_impl conversion 996 $aPalynos$92185501 997 $aUNINA LEADER 04360oam 2200721I 450 001 9910965389703321 005 20260122151821.0 010 $a0-429-11284-X 010 $a1-283-59665-2 010 $a9786613909107 010 $a1-4398-9315-2 024 7 $a10.1201/b11802 035 $a(CKB)2670000000160871 035 $a(EBL)877141 035 $a(OCoLC)781971260 035 $a(SSID)ssj0000652007 035 $a(PQKBManifestationID)11398752 035 $a(PQKBTitleCode)TC0000652007 035 $a(PQKBWorkID)10637566 035 $a(PQKB)11246477 035 $a(Au-PeEL)EBL877141 035 $a(CaPaEBR)ebr10539448 035 $a(CaONFJC)MIL390910 035 $a(OCoLC)124076858 035 $a(CaSebORM)9781439893159 035 $a(MiAaPQ)EBC877141 035 $a(OCoLC)1261028011 035 $a(FINmELB)ELB145263 035 $a(EXLCZ)992670000000160871 100 $a20180331g20079999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security management handbook /$fedited by Harold F. Tipton, Micki Krause Nozaki 205 $a6th edition. 210 1$aBoca Raton :$cAuerbach Publications,$d2007- 215 $a1 online resource (495 p.) 225 0 $aInformation security management handbook ;$vv. 6 300 $a"An Auerbach book." 311 08$a1-4665-5910-1 311 08$a1-4398-9313-6 311 0 $a9781138199750 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications 327 $aChapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption 327 $aChapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover 330 $aUpdated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®