Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. ix |
Contributors | p. xi |
Access Control | |
Expanding PKI-Based Access Control Capabilities with Attribute Certificates | p. 3 |
Five Components to Identity Management Systems | p. 19 |
Security Weaknesses of System and Application Interfaces Used to Process Sensitive Information | p. 33 |
Telecommunications and Network Security | |
Mobile Data Security | p. 43 |
Enhanced Security Through Open Standards: A Path to a Stronger Global Digital Ecosystem | p. 57 |
Web Application Firewalls | p. 73 |
Botnets | p. 77 |
Information Security and Risk Management | |
Collaborating Information Security and Privacy to Create Effective Awareness and Training | p. 89 |
Security Information and Event Management (SIEM) Technology | p. 111 |
The Insider Threat: A View from the Outside | p. 127 |
Pod Slurping | p. 137 |
The USB (Universal Security Burden) Nightmare: Pod Slurping and Other High Storage Capacity Portable Device Vulnerabilities | p. 145 |
Diary of a Security Assessment: "Put That in Your Pipe and Smoke It!" | p. 149 |
NERC Compliance: A Compliance Review | p. 163 |
Application Security | |
Mashup Security | p. 189 |
Format String Vulnerabilities | p. 199 |
Fast Scanning Worms | p. 207 |
Cryptography | |
Message Digests | p. 217 |
Quantum Computing: The Rise of the Machine | p. 227 |
Security Architecture and Design | |
Information Flow and Covert Channels | p. 239 |
Securing Data at Rest: From Smart Phones to Tapes Defining Data at Rest | p. 281 |
Operations Security | |
Validating Tape Backups | p. 303 |
Business Continuity Planning and Disaster Recovery Planning | |
Determining Business Unit Priorities in Business Continuity Management | p. 313 |
Continuity Program Testing, Maintenance, Training, and Awareness | p. 323 |
Legal, Regulations, Compliance, and Investigation | |
Bluesnarfing | p. 337 |
Virtualization and Digital Investigations | p. 347 |
Physical Security | |
Halon Fire Suppression Systems | p. 367 |
Crime Prevention through Environmental Design | p. 377 |
Data Center Site Selection and Facility Design Considerations | p. 393 |
Index | p. 401 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.