Information Security Management Handbook, Sixth Edition, Volume 7

Author:   Richard O'Hanley (Auerbach Publications, New York, New York) ,  James S Tiller (Raleigh, North Carolina, USA)
Publisher:   Auerbach Publications
ISBN:  

9781322667461


Pages:   416
Publication Date:   01 January 2013
Format:   Electronic book text
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $250.67 Quantity:  
Add to Cart

Share |

Information Security Management Handbook, Sixth Edition, Volume 7


Add your own review!

Overview

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2(r) CISSP Common Body of Knowledge (CBK(r)), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.

  • Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals
  • Updates its bestselling predecessors with new developments in information security and the (ISC)2(r) CISSP(r) CBK(r)
  • Provides valuable insights from leaders in the field on the theory and practice of computer security technology
  • Facilitates the comprehensive and up-to-date understanding you need to stay fully informed
The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Full Product Details

Author:   Richard O'Hanley (Auerbach Publications, New York, New York) ,  James S Tiller (Raleigh, North Carolina, USA)
Publisher:   Auerbach Publications
Imprint:   Auerbach Publications
ISBN:  

9781322667461


ISBN 10:   1322667462
Pages:   416
Publication Date:   01 January 2013
Audience:   General/trade ,  General
Format:   Electronic book text
Publisher's Status:   Active
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

DOMAIN 1: ACCESS CONTROLAccess Control AdministrationWhat Business Associates Need to Know About Protected Health Information Under HIPAA and HITECH; Rebecca Herold DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITYInternet, Intranet, Extranet SecurityE-mail Security; Terence Fernandes DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENTSecurity Management Concepts and PrinciplesAppreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Robert PittmanRisk ManagementThe Information Security Auditors Have Arrived, Now What?; Todd FitzgeraldContinuous Monitoring: Extremely Valuable to Deploy Within Reason; Foster J. Henderson and Mark A. PodrackySocial Networking; Sandy BacikInsider Threat Defense; Sandy BacikRisk Management in Public Key Certificate Applications; Alex GolodServer Virtualization: Information Security Considerations; Thomas A. JohnsonSecurity Management PlanningSecurity Requirements Analysis; Sean M. PriceCERT Resilience Management Model: An Overview; Bonnie A. Goins Pilewski and Christopher PilewskiManaging Bluetooth Security; E. Eugene Schultz, Matthew W. A. Pemble, and Wendy GoucherEmployment Policies and PracticesSlash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Seth KinnettA Zero Trust Model for Security; Ken Shaurette and Thomas J. Schleppenbach DOMAIN 4: APPLICATION DEVELOPMENT SECURITYSystem Development ControlsApplication Whitelisting; Georges JahchanDesign of Information Security for Large System Development Projects; James C. MurphyBuilding Application Security Testing into the Software Development Life Cycle; Sandy BacikMalicious CodeTwenty-Five (or Forty) Years of Malware History; Robert M. Slade DOMAIN 5: CRYPTOGRAPHYCryptographic Concepts, Methodologies, and PracticesFormat Preserving Encryption; Ralph Spencer PooreElli


Author Information

James S. Tiller, CISM, CISA, CISSP, is the Head of Security Consulting, Americas, HP Enterprise Security Services, Hewlett-Packard Company. Formerly Vice President of Security North America for BT Global Services, Jim has provided security solutions for global organizations for the past 20 years. He is the author of the following books published by Auerbach: CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits; Adaptive Security Management Architecture; and A Technical Guide to IPSec Virtual Private Networks. Richard O'Hanley is the Publisher for Information and Communications Technology, Business, and Security at CRC Press. Mr. O'Hanley can be reached at rich.ohanley@taylorandfrancis.com

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List