Information security management handbook Volume 2 5th Edition by Harold Tipton, Micki Krause – Ebook PDF Instant Download/Delivery: 9780849332104, 0849332109
Full download Information security management handbook Volume 2 5th Edition after payment
Product details:
ISBN 10: 0849332109
ISBN 13: 9780849332104
Author: Harold F. Tipton, Micki Krause
Table of contents:
Domain 1: Access Control Systems and Methodology
Chapter 1: Insight into Intrusion Prevention Systems
Chapter 2: Blended Threat Analysis: Passwords and Policy
Chapter 3: Identity Theft
Domain 2: Telecommunications and Network Security
Chapter 4: Network Security Overview
Chapter 5: Storage Area Networks Security Protocols and Mechanisms
Chapter 6: Putting Security in the Transport: TLS
Chapter 7: Access Control Using RADIUS
Chapter 8: An Examination of Firewall Architectures: II
Chapter 9: Voice-over-IP Security Issues
Chapter 10: Secure Web Services: Holes and Fillers
Chapter 11: Insecurity by Proxy
Chapter 12: Wireless Security
Domain 3: Security Management Practices
Chapter 13: Validating Your Business Partners
Chapter 14: Change That Attitude: The ABCs of a Persuasive Security Awareness Program
Chapter 15: Annual Security Awareness Briefing for the End User
Chapter 16: The Role of Information Security in the Enterprise Risk Management Structure
Chapter 17: Establishing an E-Mail Retention Policy: Preventing Potential Legal Nightmares
Chapter 18: When Trust Goes Beyond the Border: Moving Your Development Work Offshore
Chapter 19: Ten Steps to Effective Web-Based Security Policy Development and Distribution
Chapter 20: Understanding CRM
Domain 4: Application Program Security
Chapter 21: Cross-Site Scripting (XSS)
Chapter 22: Stack-Based Buffer Overflows
Chapter 23: Incorporating HIPAA Security Requirements into an Enterprise Security Program
Chapter 24: Preventing SQL Injection Security Vulnerabilities through Data Sanitization
Chapter 25: Net-Based Malware Detection: A Comparison with Intrusion Detection Models
Domain 5: Cryptography
Chapter 26: Cryptographic Key Management Concepts
Domain 6: Computer, System, and Security Architecture
Chapter 27: Creating a Secure Architecture
Chapter 28: Common Models for Architecting an Enterprise Security Capability
Domain 7: Operations Security
Chapter 29: WLAN Security Update
Chapter 30: Operations Security Abuses
Chapter 31: Patch Management 101: It Just Makes Good Sense!
Chapter 32: Security Patch Management: The Process
Chapter 33: Best Practice in Contingency Planning or Contingency Planning Program Maturity
Domain 9: Law, Investigation, and Ethics
Chapter 34: Jurisdictional Issues in Global Transmissions
Chapter 35: An Emerging Information Security Minimum Standard of Due Care
Chapter 36: ISPs and Accountability
Chapter 37: Spyware, Spooks, and Cyber-Goblins
Chapter 38: Honeypot Essentials
Chapter 39: Obscuring URLs
Domain 10: Physical Security
Chapter 40: Personnel Security Screening
Chapter 41: Workplace Violence: Event Characteristics and Prevention
People also search:
information security and management
information security manager acb bank
cyber security management and policy
information security and management pdf
cyber security management and policy salary
Tags: Harold Tipton, Micki Krause, Information, security