Für diesen Artikel ist leider kein Bild verfügbar.

Information Security Management Handbook, Fourth Edition, Volume II

Harold F. Tipton (Herausgeber)

Buch | Hardcover
640 Seiten
2000
Auerbach (Verlag)
978-0-8493-0800-0 (ISBN)
62,30 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This handbook is a useful reference for anyone involved in the security of information systems.
The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly.

Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems.

Introduction

DOMAIN 1ACCESS CONTROL SYSTEMS AND METHODOLOGY
Single Sign OnCentralized Authentication Services (RADIUS, TACACS, DIAMETER)

DOMAIN 2TELECOMMUNICATIONS AND NETWORK SECURITY
E-Mail Security
Integrity and Security of ATM
An Introduction to Secure Remote Access
Packet Sniffers and Network Monitors
Enclaves: The Enterprise as an Extranet
IPSec Virtual Private Networks

DOMAIN 3SECURITY MANAGEMENT PRACTICES
Penetration Testing
The Building Blocks of Information Security
The Business Case for Information Security: Selling Management on the Protection of Vital Secrets and Products

DOMAIN 4APPLICATIONS AND SYSTEMS DEVELOPMENT SECURITY
Peoplesoft Security
World Wide Web Application Security
Common System Design Flaws and Security
Issues
Data Marts and Data Warehouses: Keys to the Future or Keys to the Kingdom?
Mitigating E-business Security Risks: Public Key Infrastructures in the Real World

DOMAIN 5:CRYPTOGRAPHY
Introduction to Encryption
Three New Models for the Application of Cryptography
Methods of Attacking and Defending Cryptosystems
Message Authentication

DOMAIN 6:SECURITY ARCHITECTURE AND MODELSIntroduction to UNIX Security for Security Practitioners

DOMAIN 7:OPERATIONS SECURITYHacker Tools and Techniques
An Introduction to Hostile Code and Its Control

DOMAIN 8:BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING
The Business Impact Assessment Process

DOMAIN 10:LAW, INVESTIGATIONS, AND ETHICS
Computer Crime Investigations: Managing a Process without Any Golden Rules CIRT: Responding to Attack
Improving Network Level Security through Real Time Monitoring and Intrusion Detection
Operational Forensics

Erscheint lt. Verlag 20.10.2000
Zusatzinfo 49 Halftones, black and white; 21 Tables, black and white; 50 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 235 mm
Gewicht 1021 g
Themenwelt Schulbuch / Wörterbuch Lexikon / Chroniken
Informatik Theorie / Studium Kryptologie
ISBN-10 0-8493-0800-3 / 0849308003
ISBN-13 978-0-8493-0800-0 / 9780849308000
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich