Information Security Management Handbook, Sixth Edition, Volume 4 (6th New edition)

Information Security Management Handbook, Sixth Edition, Volume 4 (6th New edition)

By: Harold F. Tipton (editor), Micki Krause Nozaki (editor)Hardback

Up to 2 WeeksUsually despatched within 2 weeks


Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography. As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.

About Author

Harold F. Tipton, HFT Associates, Villa Park, California, USA Micki Krause Nozaki, Pacific Life Insurance Company, Newport Beach, California, USA


DOMAIN 1: ACCESS CONTROL Access Control Administration Back to the Future, Paul A. Henry DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY Communications and Network Security Adaptive Threats and Defenses, Sean Price Achieving Global Information Systems Transformation (GIST) through Standards: Foundations for Standards-Based Network Visibility via IF-MAP and Beyond, David O'Berry A Primer on De-mystifying US Government Networks, Samuel Chun, CISSP Network Attacks and Countermeasures Anti-spam: Bayesian Filtering, George Jahchan DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT Security Management Concepts and Principles Measuring Information Security and Privacy Training and Awareness Effectiveness, Rebecca Herold Managing Mobile Device Security, E. Eugene Schultz and Gal Shpantzer Establishing an Information Security Program for Local Government, Robert Pittman Policies, Standards, Procedures and Guidelines A Business Case for ISO 27001 Certification, Tom Carlson and Robert Forbes Achieving PCI DSS Compliance: A Compliance Review, Bonnie Goins Pilewski and Christopher A. Pilewski Risk Management Leveraging IT Control Frameworks for Compliance, Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT Rats in the Cellar and Bats in the Attic, Not Enough Depth to My Security, Ken Shaurette The Outsourcing of IT: Seeing the Big Picture, Foster Henderson Understanding Information Risk Management, Tom Carlson and Nick Halvorson The Sarbanes-Oxley Revolution: Hero or Hindrance? Seth Kinnett DOMAIN 4: APPLICATION SECURITY System Development Controls Data Loss Prevention Program, Powell Hamilton Data Reliability: Trusted Time Stamps, Jeff Stapleton Security in the.NET Framework, James D. Murray DOMAIN 5: CRYPTOGRAPHY Crypto Concepts, Methodologies and Practices Cryptography: A Unifying Principle in Compliance Programs, Ralph Spencer Poore DOMAIN 6: SECURITY ARCHITECTURE & DESIGN Principles of Computer and Network Organizations, Architectures and Designs Best Practices in Virtualization Security, Shanit Gupta Everything New Is Old Again, Robert M. Slade DOMAIN 7: OPERATIONS SECURITY Operations Controls A Brief Summary of Warfare and Commercial Entities, Rob Shein Information Destruction Requirements and Techniques, Ben Rothke DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING Business Continuity Planning Integrated Business Continuity Planning, James Murphy CERT/BERT: Community and Business Emergency Response, Carl Jackson DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATION Major Categories of Computer Crime Cyberstalking, Micki Krause Incident Handling Is Software Write Blocking a Viable Alternative to Hardware Write Blocking in Computer Forensics? Paul A. Henry DOMAIN 10: PHYSICAL SECURITY Elements of Physical Security Protection of Sensitive Data, Sandy Bacik Water Leakage and Flooding, Sandy Bacik Site Selection and Facility Design Considerations, Sandy Bacik An Overview of IP-based Video Surveillance, Leo Kahng

Product Details

  • ISBN13: 9781439819029
  • Format: Hardback
  • Number Of Pages: 529
  • ID: 9781439819029
  • weight: 1111
  • ISBN10: 1439819025
  • edition: 6th New edition

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly