Handbook of Information Secutity Management
Auerbach (Verlag)
978-0-8493-9974-9 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Completely revised and updated, the 1999 edition of Handbook of Information Security Management reveals the precise nuts and bolts of exactly how to handle all the most challenging security problems.
Handbook of Information Security Management provides dozens of case studies and analyses showing your students exactly how to protect systems and data using the latest tools. With Handbook of Information Security Management, your students will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
Handbook of Information Security Management delivers in-depth guidance on:
organizing a corporate information security function
creating a framework for developing security awareness throughout the company
analyzing and managing risk
developing a business continuity plan if disaster strikes
Zeroing in on latebreaking technical security issues, the book shows your students:
proven ways to design and develop secure systems
methods to build safeguards into the system upfront, instead of adding them at a later date
expert tools and techniques commonly used to create the most secure systems
the most effective access controls as well as various models and techniques for user verification and automated intrusion detection
and the easiest way to prepare for certification exams administered by the ISC-2
Here your students will find complete information on microcomputer and LAN security, security for the World Wide Web, biometric identification, enterprise security architecture, implementing and managing network-based controls, using cryptography to secure communications and commercial transactions, and much more.
In sum, Handbook of Information Security Management 1999 Edition will show your students how to secure systems against all intruders and security threats - no matter where they come from.
Domain 1: Access Control Systems and Methodology
1.1 Access Control Issues
1.1.1 Biometric Identification
1.1.2 Relational Database Access Controls Using SQL
1.2 Access Control Administration
1.2.1 Implementation of Access Controls
1.2.2 Implementing Kerberos in Distributed Systems
Domain 2: Telecommunications & Network Security
2.1 Network Security
2.1.1 Secured Connections to External Networks
2.1.2 Introduction to LAN/WAN Security
2.2 Internet, Intranet, Extranet Security
2.2.1 Security Management for World Wide Web
2.2.2 Assessing & Combating the Sniffer Threat
2.2.3 Internet Security: Securing the Perimeter
2.2.4 Firewall Management and Internet Attacks
2.3 Communications Security Management & Techniques
2.3.1 Electronic Commerce Security
2.3.2 Client/Server Security
Domain 3: Business Continuity Planning
3.1 Business Continuity Planning
3.1.1 Business Continuity in the Distributed Environment
3.1.2 Re-Engineering the BCP Process
3.2 Distributed Systems BCP
3.2.1 The Business Impact Assessment Process
Domain 4: Security Management Practices
4.1 Information Classification
4.2 Security Awareness
4.2.1 Information Warfare & the IS Security Professional
4.3 Organization Architecture
4.3.1 Enterprise Security Architecture
4.3.2 An Introduction to IPSEC
4.4 Policy Development
4.4.1 Policy Development
4.5 Risk Management
4.5.1 Risk Analysis & Assessment
4.5.2 Protecting High Tech Business Secrets
Domain 5: Security Architecture & Models
5.1 Microcomputer & LAN Security
5.1.1 Microcomputer and LAN Security
Domain 6: Law, Investigation & Ethics
6.1 Investigation
6.1.1 Computer Crime Investigation & Forensics
6.2 Information Ethics
6.2.1 Computer Ethics
Domain 7: Application and Systems Development Security
7.1 Security Models for Object Oriented Databases
7.2 System Security
7.2.1 System Integrity Engineering
Domain 8: Cryptography
8.1 Crypto Technology and Implementations
8.1.1 Fundamentals of Cryptography & Encryption
8.1.2 Principles & Applications of Key Management
Domain 9: Computer Operations Security
9.1 Operator, Hardware and Media Controls
9.1.1 Operations Security & Controls
Domain 10: Physical Security
10.1 Threats and Facility Requirements
10.1.1 Physical Security
10.2 Personnel Physical Access Control
10.2.1 Information Security & Personnel Practices
10.3 Microcomputer Physical Security
10.3.1 Protecting the Portable Computing Environment
Erscheint lt. Verlag | 9.11.1998 |
---|---|
Zusatzinfo | 19 Halftones, black and white; 27 Tables, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 235 mm |
Gewicht | 1202 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 0-8493-9974-2 / 0849399742 |
ISBN-13 | 978-0-8493-9974-9 / 9780849399749 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich