Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Security Management Handbook, Fourth Edition, Volume III - Harold F. Tipton

Information Security Management Handbook, Fourth Edition, Volume III

Buch | Hardcover
848 Seiten
2001
Auerbach (Verlag)
978-0-8493-1127-7 (ISBN)
CHF 71,55 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Prepares you for the CISSP exam, and also for your work as a professional. This book gives you the information you need to understand the exam's core subjects. It also provides an overview of the information security arena.
Whether you are active in security management or studying for the CISSP exam, you need accurate information you can trust. A practical reference and study guide, Information Security Management Handbook, Fourth Edition, Volume 3 prepares you not only for the CISSP exam, but also for your work as a professional. From cover to cover the book gives you the information you need to understand the exam's core subjects.

Providing an overview of the information security arena, each chapter presents a wealth of technical detail. The changes in the technology of information security and the increasing threats to security from open systems make a complete and up-to-date understanding of this material essential. Volume 3 supplements the information in the earlier volumes of this handbook, updating it and keeping it current.

There is no duplication of material between any of the three volumes. Because the knowledge required to master information security - the Common Body of Knowledge (CBK) - is growing so quickly, it requires frequent updates. As a study guide or resource that you can use on the job, Information Security Management Handbook, Fourth Edition, Volume 3 is the book you will refer to over and over again.

DOMAIN 1: ACCESS CONTROL SYSTEMS AND METHODOLOGY
Access Control Techniques
Biometrics: What's New?
Access Control Administration
Privacy in the Healthcare Industry
Methods of Attack
A New Breed of Hacker Tools and Defenses
Social Engineering
DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY
Communications and Network Security
Security and Network Technologies
Wired and Wireless Physical Layer Security Issues
Network Router Security
Internet, Intranet, Extranet Security
Wireless Internet Security
VPN Deployment/Evaluation
Testing Checkpoint Firewalls
Comparing Firewall Technologies
The (In)Security of VPNs
E-Mail Security
Cookies and Web Bugs
Leveraging VPN
Wireless LAN Security
DOMAIN 3: SECURITY MANAGEMENT PRACTICES
Security Management Practices
Maintaining Management's Commitment
Awareness and Training
Information Security Training: Making it Happen
Policies, Standards, Procedures, and Guidelines
Policy Development
Risk Management
A Matter of Trust
Risk Management and Analysis
New Trends in Information Risk Management
Information Security in the Enterprise
Managing Enterprise Security Information
Change Control Management
Change Control Management
DOMAIN 4: APPLICATIONS AND SYSTEMS DEVELOPMENT SECURITY
Application Issues
Web Application Security
The Perfect Security - A New World Order
XML Security
XML and Information Security
Databases and Data Warehousing
Digital Signatures in Relational Database Applications
Security and Privacy Considerations in Data Warehousing
DOMAIN 5: CRYPTOGRAPHY
Private Key Algorithms
A Look at the Advanced Encryption Standard (AES)
Public Key Infrastructure (PKI)
Preserving Public Key Hierarchy
Domain 6: Security Architecture and Models
Principles of Computer and Network Organizations, Architectures, and Designs
Reflections on Data Base Integrity
DOMAIN 7: OPERATIONS SECURITY
Intrusion Detection
Intelligent Intrusion Analysis
Auditing
Auditing the E-Commerce Environment
DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING
Business Continuity Planning
Reengineering the Business Continuity Planning Process
Disaster Recovery Planning
Business Resumption Planning
DOMAIN 9: LAW, INVESTIGATIONS, AND ETHICS
Investigation
What Happened
Information Law
Internet Gripe Sites
State Control of Unsolicited E-Mail
DOMAIN 10: THREATS AND FACILITY REQUIREMENTS
Threats and Facility Requirements
Physical Security

Erscheint lt. Verlag 26.9.2001
Zusatzinfo 100 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 235 mm
Gewicht 1315 g
Themenwelt Schulbuch / Wörterbuch Lexikon / Chroniken
Informatik Theorie / Studium Kryptologie
ISBN-10 0-8493-1127-6 / 0849311276
ISBN-13 978-0-8493-1127-7 / 9780849311277
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich