LEADER 04631nam 2200685Ia 450 001 9910825881503321 005 20200520144314.0 010 $a0-429-10792-7 010 $a1-283-35050-5 010 $a9786613350503 010 $a1-4398-5346-0 024 7 $a10.1201/b11250 035 $a(CKB)2550000000063484 035 $a(EBL)800925 035 $a(OCoLC)785727382 035 $a(SSID)ssj0000581435 035 $a(PQKBManifestationID)11965984 035 $a(PQKBTitleCode)TC0000581435 035 $a(PQKBWorkID)10531335 035 $a(PQKB)11013392 035 $a(Au-PeEL)EBL800925 035 $a(CaPaEBR)ebr10508887 035 $a(CaONFJC)MIL335050 035 $a(OCoLC)124076858 035 $a(CaSebORM)9781439853467 035 $a(MiAaPQ)EBC800925 035 $a(EXLCZ)992550000000063484 100 $a20111110d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security management handbook$hVolume 5 /$fedited by Harold F. Tipton, Micki Krause 205 $a6th ed. 210 $aBoca Raton $cAuerbach Publications$dc2012 215 $a1 online resource (544 p.) 300 $aDescription based upon print version of record. 311 $a1-4665-0847-7 311 $a1-4398-5345-2 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements? 327 $aChapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security 327 $aChapter 17: Improving Enterprise Security through Predictive AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security 327 $aChapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover 330 $aUpdated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP® Common Body of Knowledge (CBK®).This edition updates the benchmark Volume 1 606 $aComputer security$xManagement$vHandbooks, manuals, etc 606 $aData protection$vHandbooks, manuals, etc 615 0$aComputer security$xManagement 615 0$aData protection 676 $a005.8 701 $aTipton$b Harold F$01663226 701 $aNozaki$b Micki Krause$01663227 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825881503321 996 $aInformation security management handbook$94020378 997 $aUNINA