Information Security Management Handbook, Volume II - Rilegato

 
9780849308000: Information Security Management Handbook, Volume II

Sinossi

The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly. Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti

Introduction

DOMAIN 1 ACCESS CONTROL SYSTEMS AND METHODOLOGY
Single Sign On Centralized Authentication Services (RADIUS, TACACS, DIAMETER)

DOMAIN 2 TELECOMMUNICATIONS AND NETWORK SECURITY
E-Mail Security
Integrity and Security of ATM
An Introduction to Secure Remote Access
Packet Sniffers and Network Monitors
Enclaves: The Enterprise as an Extranet
IPSec Virtual Private Networks

DOMAIN 3 SECURITY MANAGEMENT PRACTICES
Penetration Testing
The Building Blocks of Information Security
The Business Case for Information Security: Selling Management on the Protection of Vital Secrets and Products

DOMAIN 4 APPLICATIONS AND SYSTEMS DEVELOPMENT SECURITY
Peoplesoft Security
World Wide Web Application Security
Common System Design Flaws and Security
Issues
Data Marts and Data Warehouses: Keys to the Future or Keys to the Kingdom?
Mitigating E-business Security Risks: Public Key Infrastructures in the Real World

DOMAIN 5: CRYPTOGRAPHY
Introduction to Encryption
Three New Models for the Application of Cryptography
Methods of Attacking and Defending Cryptosystems
Message Authentication

DOMAIN 6: SECURITY ARCHITECTURE AND MODELS Introduction to UNIX Security for Security Practitioners

DOMAIN 7: OPERATIONS SECURITY Hacker Tools and Techniques
An Introduction to Hostile Code and Its Control

DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING
The Business Impact Assessment Process

DOMAIN 10: LAW, INVESTIGATIONS, AND ETHICS
Computer Crime Investigations: Managing a Process without Any Golden Rules CIRT: Responding to Attack
Improving Network Level Security through Real Time Monitoring and Intrusion Detection
Operational Forensics

Product Description

Book by None

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.