Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Security Management Handbook on CD-ROM, 2005 Edition -

Information Security Management Handbook on CD-ROM, 2005 Edition

CD-ROM (Software)
2005 | 4th New edition
Auerbach (Hersteller)
978-0-8493-3947-9 (ISBN)
CHF 209,95 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
The multi-volume set of the Information Security Management Handbook is now available on CD-ROM. Containing the complete contents of the set, readers get a resource that is lightweight and portable, linked and searchable by keyword, and organized under the Common Body of Knowledge (CBK) domains. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information that readers will not find anywhere else, including chapters from other security and networking books that have never appeared in the print editions. Exportable text and hard copies are available at the click of a mouse.

Tipton; Harold F. HFT Associates, Villa Park, California, USA,Krause; Micki Pacific Life Insurance Company, Newport Beach, California, U,

ACCESS CONTROL SYSTEMS AND METHODOLOGY
Access Control Techniques
Access Control Administration
Identification and Authentication Techniques
Access Control Methodologies and Implementation
Methods of Attack
Monitoring and Penetration Testing

TELECOMMUNICATIONS, NETWORK, AND INTERNET
SECURITY
Communications and Network Security
Internet, Intranet, Extranet Security
E-mail Security
Secure Voice Communications
Network Attacks and Countermeasures

SECURITY MANAGEMENT PRACTICES
Security Management Concepts and Principles
Change Control Management
Data Classification
Risk Management
Policies, Standards, Procedures and Guidelines
Risk Management
Security Awareness Training
Security Management Planning

APPLICATION PROGRAM SECURITY
Application Issues
Databases and Data Warehousing
Systems Development Controls
Malicious Code
Methods of Attack

CRYPTOGRAPHY
Use of Cryptography
Cryptographic Concepts, Methodologies, and Practices
Private Key Algorithms
Public Key Infrastructure (PKI)
System Architecture for Implementing Cryptographic
Functions
Methods of Attack

SECURITY ARCHITECTURE AND MODELS
Principles of Computer and Network Organizations,
Architectures, and Designs
Principles of Security Models, Architectures and Evaluation
Criteria Formulating an Enterprise Information Security Architecture
Common Flaws and Security Issues - System Architecture
and Design

OPERATIONS SECURITY
Concepts
Resource Protection Requirements
Auditing
Intrusion Detection
Operations Controls

BUSINESS CONTINUITY PLANNING AND DISASTER
RECOVERY PLANNING
Business Continuity Planning
Disaster Recovery Planning
Elements of Business Continuity Planning

LAW, INVESTIGATION, AND ETHICS
Information Law
Investigations
Major Categories of Computer Crime
Incident Handling
Ethics

PHYSICAL SECURITY
Elements of Physical Security
Environment and Life Safety

Erscheint lt. Verlag 27.6.2005
Verlagsort London
Sprache englisch
Gewicht 91 g
Themenwelt Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-8493-3947-2 / 0849339472
ISBN-13 978-0-8493-3947-9 / 9780849339479
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich