Für diesen Artikel ist leider kein Bild verfügbar.

Handbook of Information Secutity Management

Buch | Hardcover
784 Seiten
1998 | 99th New edition
Auerbach (Verlag)
978-0-8493-9974-9 (ISBN)
84,75 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This guide provides information on ways to design and develop secure information systems, showing how to build safeguards in the system from the start. It describes effective access controls as well as various models and techniques for user verification and automated intrusion detection.
Completely revised and updated, the 1999 edition of Handbook of Information Security Management reveals the precise nuts and bolts of exactly how to handle all the most challenging security problems.
Handbook of Information Security Management provides dozens of case studies and analyses showing your students exactly how to protect systems and data using the latest tools. With Handbook of Information Security Management, your students will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
Handbook of Information Security Management delivers in-depth guidance on:
organizing a corporate information security function

creating a framework for developing security awareness throughout the company

analyzing and managing risk

developing a business continuity plan if disaster strikes
Zeroing in on latebreaking technical security issues, the book shows your students:

proven ways to design and develop secure systems

methods to build safeguards into the system upfront, instead of adding them at a later date

expert tools and techniques commonly used to create the most secure systems

the most effective access controls as well as various models and techniques for user verification and automated intrusion detection

and the easiest way to prepare for certification exams administered by the ISC-2
Here your students will find complete information on microcomputer and LAN security, security for the World Wide Web, biometric identification, enterprise security architecture, implementing and managing network-based controls, using cryptography to secure communications and commercial transactions, and much more.
In sum, Handbook of Information Security Management 1999 Edition will show your students how to secure systems against all intruders and security threats - no matter where they come from.

Domain 1: Access Control Systems and Methodology
1.1 Access Control Issues
1.1.1 Biometric Identification
1.1.2 Relational Database Access Controls Using SQL
1.2 Access Control Administration
1.2.1 Implementation of Access Controls
1.2.2 Implementing Kerberos in Distributed Systems
Domain 2: Telecommunications & Network Security
2.1 Network Security
2.1.1 Secured Connections to External Networks
2.1.2 Introduction to LAN/WAN Security
2.2 Internet, Intranet, Extranet Security
2.2.1 Security Management for World Wide Web
2.2.2 Assessing & Combating the Sniffer Threat
2.2.3 Internet Security: Securing the Perimeter
2.2.4 Firewall Management and Internet Attacks
2.3 Communications Security Management & Techniques
2.3.1 Electronic Commerce Security
2.3.2 Client/Server Security
Domain 3: Business Continuity Planning
3.1 Business Continuity Planning
3.1.1 Business Continuity in the Distributed Environment
3.1.2 Re-Engineering the BCP Process
3.2 Distributed Systems BCP
3.2.1 The Business Impact Assessment Process
Domain 4: Security Management Practices
4.1 Information Classification
4.2 Security Awareness
4.2.1 Information Warfare & the IS Security Professional
4.3 Organization Architecture
4.3.1 Enterprise Security Architecture
4.3.2 An Introduction to IPSEC
4.4 Policy Development
4.4.1 Policy Development
4.5 Risk Management
4.5.1 Risk Analysis & Assessment
4.5.2 Protecting High Tech Business Secrets
Domain 5: Security Architecture & Models
5.1 Microcomputer & LAN Security
5.1.1 Microcomputer and LAN Security
Domain 6: Law, Investigation & Ethics
6.1 Investigation
6.1.1 Computer Crime Investigation & Forensics
6.2 Information Ethics
6.2.1 Computer Ethics
Domain 7: Application and Systems Development Security
7.1 Security Models for Object Oriented Databases
7.2 System Security
7.2.1 System Integrity Engineering
Domain 8: Cryptography
8.1 Crypto Technology and Implementations
8.1.1 Fundamentals of Cryptography & Encryption
8.1.2 Principles & Applications of Key Management
Domain 9: Computer Operations Security
9.1 Operator, Hardware and Media Controls
9.1.1 Operations Security & Controls
Domain 10: Physical Security
10.1 Threats and Facility Requirements
10.1.1 Physical Security
10.2 Personnel Physical Access Control
10.2.1 Information Security & Personnel Practices
10.3 Microcomputer Physical Security
10.3.1 Protecting the Portable Computing Environment

Erscheint lt. Verlag 9.11.1998
Zusatzinfo 19 Halftones, black and white; 27 Tables, black and white
Verlagsort London
Sprache englisch
Maße 156 x 235 mm
Gewicht 1202 g
Themenwelt Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
ISBN-10 0-8493-9974-2 / 0849399742
ISBN-13 978-0-8493-9974-9 / 9780849399749
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich