skip to content
Information security management handbook on CD-ROM Preview this item
ClosePreview this item
Checking...

Information security management handbook on CD-ROM

Author: Micki Krause Nozaki; Harold F Tipton
Publisher: Boca Raton, FL : CRC Press, ©2002.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Handbooks and manuals
Handbooks, manuals, etc
Additional Physical Format: CD-ROM version:
Information security management handbook on CD-ROM.
Boca Raton, FL : Auerbach, ©2002
(OCoLC)49521039
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Micki Krause Nozaki; Harold F Tipton
ISBN: 9781439858226 1439858225
OCLC Number: 60785263
Description: 1 online resource.
Contents: Domain 1. Access control systems and methodology: Access control techniques ; Access control administration ; Identification and authentication techniques ; Access control methodologies and implementation ; Methods of attack ; Monitoring and penetration testing --
Domain 2. Telecommunications and network security: Communications and network security ; Internet/Intranet/Extranet ; E-mail security ; Secure voice communications ; Network attacks and countermeasures --
Domain 3. Security management practices: Security management concepts and principles ; Change control management ; Data classification ; Risk management ; Employment policies and practices ; Policies, standards, procedures, and guidelines ; Security awareness training ; Security management planning --
Domain 4. Applications and system development security: Application issues ; Databases and data warehousing ; Systems development controls ; Malicious code ; Data/information storage --
Domain 5. Cryptography: Use of cryptography ; Cryptographic concepts, methodologies, and practices ; Private key algorithms ; Public key infrastructure (PKI) ; System architecture for implementing cryptographic functions ; Methods of attack --
Domain 6. Security architecture and models: Principles of computer and network organizations, architectures, and designs ; Principles of security models, architectures and evaluation criteria ; Common flaws and security issues --
system architecture and design --
Domain 7. Operations security: Concepts ; Resource protection requirements ; Auditing ; Intrusion detection ; Operations controls --
Domain 8. BCP and DRP: Business continuity planning ; Disaster recovery planning ; Elements of business continuity planning --
Domain 9. Law, investigation, and ethics: Information law ; Investigations ; Major categories of computer crime ; Incident handling ; Ethics --
Domain 10. Physical security: Facility requirements ; Technical controls ; Environment and life safety.
Other Titles: Information security management handbook 2003
Information security management handbook on 2003
Responsibility: Harold F. Tipton, Micki Krause, editors.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/60785263> # Information security management handbook on CD-ROM
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "60785263" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1075079006#Place/boca_raton_fl> ; # Boca Raton, FL
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh2009121243> ; # Computer security--Management
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.loc.gov/authorities/subjects/sh85035859> ; # Data protection
    schema:about <http://id.worldcat.org/fast/872493> ; # Computer security--Management
    schema:alternateName "Information security management handbook 2003" ;
    schema:alternateName "Information security management handbook on 2003" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/21428880> ; # Micki Krause Nozaki
    schema:contributor <http://viaf.org/viaf/78004525> ; # Harold F. Tipton
    schema:copyrightYear "2002" ;
    schema:datePublished "2002" ;
    schema:description "Domain 1. Access control systems and methodology: Access control techniques ; Access control administration ; Identification and authentication techniques ; Access control methodologies and implementation ; Methods of attack ; Monitoring and penetration testing -- Domain 2. Telecommunications and network security: Communications and network security ; Internet/Intranet/Extranet ; E-mail security ; Secure voice communications ; Network attacks and countermeasures -- Domain 3. Security management practices: Security management concepts and principles ; Change control management ; Data classification ; Risk management ; Employment policies and practices ; Policies, standards, procedures, and guidelines ; Security awareness training ; Security management planning -- Domain 4. Applications and system development security: Application issues ; Databases and data warehousing ; Systems development controls ; Malicious code ; Data/information storage -- Domain 5. Cryptography: Use of cryptography ; Cryptographic concepts, methodologies, and practices ; Private key algorithms ; Public key infrastructure (PKI) ; System architecture for implementing cryptographic functions ; Methods of attack -- Domain 6. Security architecture and models: Principles of computer and network organizations, architectures, and designs ; Principles of security models, architectures and evaluation criteria ; Common flaws and security issues -- system architecture and design -- Domain 7. Operations security: Concepts ; Resource protection requirements ; Auditing ; Intrusion detection ; Operations controls -- Domain 8. BCP and DRP: Business continuity planning ; Disaster recovery planning ; Elements of business continuity planning -- Domain 9. Law, investigation, and ethics: Information law ; Investigations ; Major categories of computer crime ; Incident handling ; Ethics -- Domain 10. Physical security: Facility requirements ; Technical controls ; Environment and life safety."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1075079006> ;
    schema:genre "Handbooks and manuals"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/49521039> ;
    schema:name "Information security management handbook on CD-ROM"@en ;
    schema:productID "60785263" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/60785263#PublicationEvent/boca_raton_fl_crc_press_2002> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1075079006#Agent/crc_press> ; # CRC Press
    schema:url <http://www.crcnetbase.com/isbn/9780849310683> ;
    schema:url <http://www.itknowledgebase.net/ejournals/books/book_summary/summary.asp?id=66> ;
    schema:workExample <http://worldcat.org/isbn/9781439858226> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/60785263> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1075079006#Place/boca_raton_fl> # Boca Raton, FL
    a schema:Place ;
    schema:name "Boca Raton, FL" ;
    .

<http://id.loc.gov/authorities/subjects/sh2009121243> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85035859> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.worldcat.org/fast/872493> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/21428880> # Micki Krause Nozaki
    a schema:Person ;
    schema:familyName "Nozaki" ;
    schema:givenName "Micki Krause" ;
    schema:name "Micki Krause Nozaki" ;
    .

<http://viaf.org/viaf/78004525> # Harold F. Tipton
    a schema:Person ;
    schema:familyName "Tipton" ;
    schema:givenName "Harold F." ;
    schema:name "Harold F. Tipton" ;
    .

<http://worldcat.org/isbn/9781439858226>
    a schema:ProductModel ;
    schema:isbn "1439858225" ;
    schema:isbn "9781439858226" ;
    .

<http://www.worldcat.org/oclc/49521039>
    a schema:CreativeWork ;
    rdfs:label "Information security management handbook on CD-ROM." ;
    schema:description "CD-ROM version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/60785263> ; # Information security management handbook on CD-ROM
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.