LEADER 04277oam 2200685I 450 001 9910813980803321 005 20200520144314.0 010 $a0-429-11284-X 010 $a1-283-59665-2 010 $a9786613909107 010 $a1-4398-9315-2 024 7 $a10.1201/b11802 035 $a(CKB)2670000000160871 035 $a(EBL)877141 035 $a(OCoLC)781971260 035 $a(SSID)ssj0000652007 035 $a(PQKBManifestationID)11398752 035 $a(PQKBTitleCode)TC0000652007 035 $a(PQKBWorkID)10637566 035 $a(PQKB)11246477 035 $a(Au-PeEL)EBL877141 035 $a(CaPaEBR)ebr10539448 035 $a(CaONFJC)MIL390910 035 $a(OCoLC)124076858 035 $a(CaSebORM)9781439893159 035 $a(MiAaPQ)EBC877141 035 $a(EXLCZ)992670000000160871 100 $a20180331g20079999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security management handbook /$fedited by Harold F. Tipton, Micki Krause Nozaki 205 $a6th ed. 210 1$aBoca Raton :$cAuerbach Publications,$d2007- 215 $a1 online resource (495 p.) 225 0 $aInformation security management handbook ;$vv. 6 300 $a"An Auerbach book." 311 $a1-4665-5910-1 311 $a1-4398-9313-6 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications 327 $aChapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption 327 $aChapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover 330 $aUpdated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®