• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Information security management handbook.

پدید آورنده
Harold F. Tipton, Micki Krause, editors.

موضوع
Computer security-- Management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer security-- Management.,Data protection.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1420072412
(Number (ISBN
9781420072419
Erroneous ISBN
9780849315183

NATIONAL BIBLIOGRAPHY NUMBER

Number
b786418

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Information security management handbook.
General Material Designation
[Book]
First Statement of Responsibility
Harold F. Tipton, Micki Krause, editors.
Volume Designation
Volume 4 /

EDITION STATEMENT

Edition Statement
4th edition.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton :
Name of Publisher, Distributor, etc.
Auerbach Publications,
Date of Publication, Distribution, etc.
[2003]

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

GENERAL NOTES

Text of Note
Includes index.

CONTENTS NOTE

Text of Note
Front cover; Contributors; Contents; Introduction; Domain 1: Access Control Systems and Methodology; Chapter 1. It Is All about Control; Chapter 2. Controlling FTP: Providing Secured Data Transfers; Chapter 3. The Case for Privacy; Chapter 4. Breaking News: The Latest Hacker Attacks and Defenses; Chapter 5. Counter-Economic Espionage; Domain 2. Telecommunications and Network Security; Chapter 6. What's Not So Simple about SNMP?; Chapter 7. Security for Broadband Internet Access Users; Chapter 8. New Perspectives on VPNs; Chapter 9. An Examination of Firewall Architectures.
Text of Note
Chapter 10. Deploying Host-Based Firewalls across the Enterprise: A Case StudyChapter 11. Overcoming Wireless LAN Security Vulnerabilities; Chapter 12. Voice Security; Chapter 13. Secure Voice Communications (Vol); Chapter 14. Packet Sniffers: Use and Misuse; Chapter 15. ISPs and Denial-of-Service Attacks; Domain 3. Security Management Practices; Chapter 16. The Human Side of Information Security; Chapter 17. Security Management; Chapter 18. The Common Criteria for IT Security Evaluation; Chapter 19. The Security Policy Life Cycle: Functions and Responsibilities.
Text of Note
Chapter 20. Security AssessmentChapter 21. Evaluating the Security Posture of an Information Technology Environment: The Challenges of Balancing Risk, Cost, and Frequency of Evaluating Safeguards; Chapter 22. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security; Chapter 23. How to Work with a Managed Security Service Provider; Chapter 24. Considerations for Outsourcing Security; Chapter 25. Role and Resonsibilities of the Information Systems Security Officer; Chapter 26. Information Protection: Organization, Roles, and Separation of Duties.
Text of Note
Chapter 27. Organizing for Success: Some Human Resources Issues in Information SecurityChapter 28. Ownership and Custody of Data; Domain 4: Application Program Security; Chapter 29. Application Security; Chapter 30. Certification and Acrreditation Methodology; Chapter 31. A Framework for Certification Testing; Chapter 32. Malicious Code: The Threat, Detection, and Protection; Chapter 33. Malware and Computer Viruses; Domain 5: Cryptography; Chapter 34. Steganography: The Art of Hiding Messages; Chapter 35. An Introduction to Cryptography.
Text of Note
Chapter 36. Hash Algorithms: From Message Digests to SignaturesChapter 37. PKI Registration; Domain 6. Computer, System, and Security Architecture; Chapter 38. Security Infrastructure: Basics of Intrusion Detection Systems; Chapter 39. Firewalls, Tem Percent of the Solution: A Security Architecture Primer; Chapter 40. The Reality of Virtual Computing; Domain 7: Operations Security; Chapter 41. Directory Security; Domain 8: Business Continuity Planning; Chapter 42. The Changing Face of Continuity Planning; Chapter 43. Business Continuity Planning: A Collaborative Approach.
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the tech.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Ingram Content Group
Stock Number
TANDF_183205

OTHER EDITION IN ANOTHER MEDIUM

Title
Information Security Management Handbook, Fourth Edition, Volume 4.
International Standard Book Number
9780849315183

TOPICAL NAME USED AS SUBJECT

Computer security-- Management, Handbooks, manuals, etc.
Data protection, Handbooks, manuals, etc.
BUSINESS & ECONOMICS-- Industrial Management.
BUSINESS & ECONOMICS-- Management Science.
BUSINESS & ECONOMICS-- Management.
BUSINESS & ECONOMICS-- Organizational Behavior.
Computer security-- Management.
Data protection.

(SUBJECT CATEGORY (Provisional

BUS-- 041000
BUS-- 042000
BUS-- 082000
BUS-- 085000

DEWEY DECIMAL CLASSIFICATION

Number
658/
.
0558
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Nozaki, Micki Krause
Tipton, Harold F.

ORIGINATING SOURCE

Date of Transaction
20201207001233.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival