rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781439853450

Information Security Management Handbook, Sixth Edition, Volume 5

by Krause Nozaki; Micki
  • ISBN13:

    9781439853450

  • ISBN10:

    1439853452

  • eBook ISBN(s):

    9781040057124

  • Edition: 6th
  • Format: Hardcover
  • Copyright: 2011-09-13
  • Publisher: Auerbach Public

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $165.00 Save up to $118.80
  • Rent Book $123.75
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Information Security Management Handbook, Sixth Edition, Volume 5 [ISBN: 9781439853450] for the semester, quarter, and short term or search our site for other textbooks by Krause Nozaki; Micki. Renting a textbook can save you up to 90% from the cost of buying.

Summary

This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required by IT security professionals. It covers the Common Body of Knowledge (CBK) that forms the standard on which all IT security programs and certifications are based. Topics covered include access control, physical (environmental) security, cryptography, application security, and operations security. Updates include new developments in information security and the (ISC)2 CBK. Other information provided in this handbook includes mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. An accompanying CD is sold separately.

Table of Contents

Introductionp. x
Editorsp. xi
Contributorsp. xiii
Access Control
Access Control Techniques
Whitelisting for Endpoint Defensep. 3
Whitelistingp. 15
Access Control Administration
RFID and Information Securityp. 21
Privileged User Managementp. 37
Privacy in the Age of Social Networkingp. 55
Telecommunications and Network Security
Communications and Network Security
IF-MAP as a Standard for Security Data Interchangep. 69
Internet, Intranet, Extranet Security
Understating the Ramifications of IPv6p. 117
Managing Security in Virtual Environmentsp. 137
Information Security and Risk Management
Security Management Concepts and Principles
Do Your Business Associate Security and Privacy Programs Live Up to HIPAA and HITECH Requirements?p. 153
Organization Culture Awareness Will Cultivate Your Information Security Programp. 163
Risk Management
Role-Based Information Security Governance: Avoiding the Company Oil Slickp. 179
Social Networking Security Exposurep. 193
Social Networking, Social Media, and Web 2.0 Security Risksp. 199
Applying Adult Education Principles to Security Awareness Programsp. 207
Security Management Planning
Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Accessp. 215
Governance and Risk Management within the Context of Information Securityp. 229
Improving Enterprise Security through Predictive Analysisp. 267
Employment Policies and Practices
Security Outsourcingp. 283
Application Development Security
System Development Controls
The Effectiveness of Access Management Reviewsp. 293
Securing SaaS Applications: A Cloud Security Perspective for Application Providersp. 301
Attacking RFID Systemsp. 313
Cryptograph
Cryptographic Concepts, Methodologies, and Practices
Cryptography: Mathematics vs. Engineeringp. 337
Cryptographic Message Syntaxp. 343
Security Architecture and Design
Principles of Computer and Network Organizations, Architectures, and Designs
An Introduction to Virtualization Securityp. 367
Operations Security
Operations Controls
Warfare and Security: Deterrence and Dissuasion in the Cyber Erap. 391
Configuration, Change, and Release Managementp. 403
Tape Backup Considerationsp. 423
Productivity vs. Securityp. 429
Continuity Planning for Small- and Medium-Sized Organizationsp. 435
Legal, Regulations, Compliance, and Investigations
Information Law
The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industryp. 447
Data Security and Privacy Legislationp. 455
Incident Handling
Discovery of Electronically Stored Informationp. 473
Physical (Environmental) Security
Elements of Physical Security
The Layered Defense Model and Perimeter Intrusion Detectionp. 489
Indexp. 505
Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contentsp. 521
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program