skip to content
Information security management handbook. Volume 4 /  Harold F. Tipton, Micki Krause, editors. Preview this item
ClosePreview this item
Checking...

Information security management handbook. Volume 4 / Harold F. Tipton, Micki Krause, editors.

Author: Harold F Tipton; Micki Krause Nozaki
Publisher: Boca Raton : Auerbach Publications, [2003]
Edition/Format:   eBook : Document : English : 4th editionView all editions and formats
Database:WorldCat
Summary:
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Handbooks and manuals
Handbooks, manuals, etc
Additional Physical Format: Print version:
Krause, Micki
Information Security Management Handbook, Fourth Edition, Volume 4
Boca Raton : CRC Press,c2002
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Harold F Tipton; Micki Krause Nozaki
ISBN: 9781420072419 1420072412
OCLC Number: 905697125
Notes: Includes index.
Description: 1 online resource.
Contents: Front cover; Contributors; Contents; Introduction; Domain 1: Access Control Systems and Methodology; Chapter 1. It Is All about Control; Chapter 2. Controlling FTP: Providing Secured Data Transfers; Chapter 3. The Case for Privacy; Chapter 4. Breaking News: The Latest Hacker Attacks and Defenses; Chapter 5. Counter-Economic Espionage; Domain 2. Telecommunications and Network Security; Chapter 6. What's Not So Simple about SNMP?; Chapter 7. Security for Broadband Internet Access Users; Chapter 8. New Perspectives on VPNs; Chapter 9. An Examination of Firewall Architectures Chapter 10. Deploying Host-Based Firewalls across the Enterprise: A Case StudyChapter 11. Overcoming Wireless LAN Security Vulnerabilities; Chapter 12. Voice Security; Chapter 13. Secure Voice Communications (Vol); Chapter 14. Packet Sniffers: Use and Misuse; Chapter 15. ISPs and Denial-of-Service Attacks; Domain 3. Security Management Practices; Chapter 16. The Human Side of Information Security; Chapter 17. Security Management; Chapter 18. The Common Criteria for IT Security Evaluation; Chapter 19. The Security Policy Life Cycle: Functions and Responsibilities Chapter 20. Security AssessmentChapter 21. Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards; Chapter 22. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security; Chapter 23. How to Work with a Managed Security Service Provider; Chapter 24. Considerations for Outsourcing Security; Chapter 25. Role and Resonsibilities of the Information Systems Security Officer; Chapter 26. Information Protection: Organization, Roles, and Separation of Duties Chapter 27. Organizing for Success: Some Human Resources Issues in Information SecurityChapter 28. Ownership and Custody of Data; Domain 4: Application Program Security; Chapter 29. Application Security; Chapter 30. Certification and Acrreditation Methodology; Chapter 31. A Framework for Certification Testing; Chapter 32. Malicious Code: The Threat, Detection, and Protection; Chapter 33. Malware and Computer Viruses; Domain 5: Cryptography; Chapter 34. Steganography: The Art of Hiding Messages; Chapter 35. An Introduction to Cryptography Chapter 36. Hash Algorithms: From Message Digests to SignaturesChapter 37. PKI Registration; Domain 6. Computer, System, and Security Architecture; Chapter 38. Security Infrastructure: Basics of Intrusion Detection Systems; Chapter 39. Firewalls, Tem Percent of the Solution: A Security Architecture Primer; Chapter 40. The Reality of Virtual Computing; Domain 7: Operations Security; Chapter 41. Directory Security; Domain 8: Business Continuity Planning; Chapter 42. The Changing Face of Continuity Planning; Chapter 43. Business Continuity Planning: A Collaborative Approach

Abstract:

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/905697125> # Information security management handbook. Volume 4 / Harold F. Tipton, Micki Krause, editors.
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "905697125" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_management> ; # BUSINESS & ECONOMICS / Management
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/data_protection> ; # Data protection
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_management_science> ; # BUSINESS & ECONOMICS / Management Science
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_organizational_behavior> ; # BUSINESS & ECONOMICS / Organizational Behavior
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_industrial_management> ; # BUSINESS & ECONOMICS / Industrial Management
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/computer_security_management_handbooks_manuals_etc> ; # Computer security -- Management -- Handbooks, manuals, etc
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/computer_security_management> ; # Computer security--Management
   schema:about <http://dewey.info/class/658.0558/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1075079006#Topic/data_protection_handbooks_manuals_etc> ; # Data protection -- Handbooks, manuals, etc
   schema:bookEdition "4th edition." ;
   schema:bookFormat schema:EBook ;
   schema:datePublished "2003" ;
   schema:description "The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech."@en ;
   schema:description "Front cover; Contributors; Contents; Introduction; Domain 1: Access Control Systems and Methodology; Chapter 1. It Is All about Control; Chapter 2. Controlling FTP: Providing Secured Data Transfers; Chapter 3. The Case for Privacy; Chapter 4. Breaking News: The Latest Hacker Attacks and Defenses; Chapter 5. Counter-Economic Espionage; Domain 2. Telecommunications and Network Security; Chapter 6. What's Not So Simple about SNMP?; Chapter 7. Security for Broadband Internet Access Users; Chapter 8. New Perspectives on VPNs; Chapter 9. An Examination of Firewall Architectures"@en ;
   schema:editor <http://experiment.worldcat.org/entity/work/data/1075079006#Person/tipton_harold_f> ; # Harold F. Tipton
   schema:editor <http://experiment.worldcat.org/entity/work/data/1075079006#Person/nozaki_micki_krause> ; # Micki Krause Nozaki
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1075079006> ;
   schema:genre "Handbooks and manuals"@en ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/1075079006#CreativeWork/information_security_management_handbook_fourth_edition_volume_4> ;
   schema:name "Information security management handbook. Volume 4 / Harold F. Tipton, Micki Krause, editors."@en ;
   schema:productID "905697125" ;
   schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=310052> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=934784> ;
   schema:workExample <http://worldcat.org/isbn/9781420072419> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/905697125> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1075079006#Person/nozaki_micki_krause> # Micki Krause Nozaki
    a schema:Person ;
   schema:familyName "Nozaki" ;
   schema:givenName "Micki Krause" ;
   schema:name "Micki Krause Nozaki" ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Person/tipton_harold_f> # Harold F. Tipton
    a schema:Person ;
   schema:familyName "Tipton" ;
   schema:givenName "Harold F." ;
   schema:name "Harold F. Tipton" ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_industrial_management> # BUSINESS & ECONOMICS / Industrial Management
    a schema:Intangible ;
   schema:name "BUSINESS & ECONOMICS / Industrial Management"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_management> # BUSINESS & ECONOMICS / Management
    a schema:Intangible ;
   schema:name "BUSINESS & ECONOMICS / Management"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_management_science> # BUSINESS & ECONOMICS / Management Science
    a schema:Intangible ;
   schema:name "BUSINESS & ECONOMICS / Management Science"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/business_&_economics_organizational_behavior> # BUSINESS & ECONOMICS / Organizational Behavior
    a schema:Intangible ;
   schema:name "BUSINESS & ECONOMICS / Organizational Behavior"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/computer_security_management> # Computer security--Management
    a schema:Intangible ;
   schema:name "Computer security--Management"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/computer_security_management_handbooks_manuals_etc> # Computer security -- Management -- Handbooks, manuals, etc
    a schema:Intangible ;
   schema:name "Computer security -- Management -- Handbooks, manuals, etc"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1075079006#Topic/data_protection_handbooks_manuals_etc> # Data protection -- Handbooks, manuals, etc
    a schema:Intangible ;
   schema:name "Data protection -- Handbooks, manuals, etc"@en ;
    .

<http://worldcat.org/entity/work/data/1075079006#CreativeWork/information_security_management_handbook_fourth_edition_volume_4>
    a schema:CreativeWork ;
   rdfs:label "Information Security Management Handbook, Fourth Edition, Volume 4" ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/905697125> ; # Information security management handbook. Volume 4 / Harold F. Tipton, Micki Krause, editors.
    .

<http://worldcat.org/isbn/9781420072419>
    a schema:ProductModel ;
   schema:isbn "1420072412" ;
   schema:isbn "9781420072419" ;
    .

<http://www.worldcat.org/title/-/oclc/905697125>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/905697125> ; # Information security management handbook. Volume 4 / Harold F. Tipton, Micki Krause, editors.
   schema:dateModified "2016-05-09" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.