did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781420090925

Information Security Management Handbook, Sixth Edition, Volume 3

by ;
  • ISBN13:

    9781420090925

  • ISBN10:

    1420090925

  • Edition: 6th
  • Format: Hardcover
  • Copyright: 2009-06-24
  • Publisher: Auerbach Public

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $135.00 Save up to $98.55
  • Rent Book $36.45
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS.
    HURRY! ONLY 1 COPY IN STOCK AT THIS PRICE
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.

Table of Contents

Prefacep. ix
Contributorsp. xi
Access Control
Expanding PKI-Based Access Control Capabilities with Attribute Certificatesp. 3
Five Components to Identity Management Systemsp. 19
Security Weaknesses of System and Application Interfaces Used to Process Sensitive Informationp. 33
Telecommunications and Network Security
Mobile Data Securityp. 43
Enhanced Security Through Open Standards: A Path to a Stronger Global Digital Ecosystemp. 57
Web Application Firewallsp. 73
Botnetsp. 77
Information Security and Risk Management
Collaborating Information Security and Privacy to Create Effective Awareness and Trainingp. 89
Security Information and Event Management (SIEM) Technologyp. 111
The Insider Threat: A View from the Outsidep. 127
Pod Slurpingp. 137
The USB (Universal Security Burden) Nightmare: Pod Slurping and Other High Storage Capacity Portable Device Vulnerabilitiesp. 145
Diary of a Security Assessment: "Put That in Your Pipe and Smoke It!"p. 149
NERC Compliance: A Compliance Reviewp. 163
Application Security
Mashup Securityp. 189
Format String Vulnerabilitiesp. 199
Fast Scanning Wormsp. 207
Cryptography
Message Digestsp. 217
Quantum Computing: The Rise of the Machinep. 227
Security Architecture and Design
Information Flow and Covert Channelsp. 239
Securing Data at Rest: From Smart Phones to Tapes Defining Data at Restp. 281
Operations Security
Validating Tape Backupsp. 303
Business Continuity Planning and Disaster Recovery Planning
Determining Business Unit Priorities in Business Continuity Managementp. 313
Continuity Program Testing, Maintenance, Training, and Awarenessp. 323
Legal, Regulations, Compliance, and Investigation
Bluesnarfingp. 337
Virtualization and Digital Investigationsp. 347
Physical Security
Halon Fire Suppression Systemsp. 367
Crime Prevention through Environmental Designp. 377
Data Center Site Selection and Facility Design Considerationsp. 393
Indexp. 401
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program