Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.
Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.
As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
As a compendium of knowledge from recognized experts on information security, this book contains a wealth of information for security practitioners. It is a compilation of several important topics that are relevant to information security. As practitioner references go, this book is one that an information security practitioner should take notice of, since it touches on a number of timely information security topics and blends the practices of security with business.
The book organizes the information security topics into ten domains, which various authors then cover. As the publisher's site states, the collection as a whole provides a ‘compilation of the fundamental knowledge, skills, techniques, and tools required of information technology (IT) security professionals.’ The ten domains are:
Domain 1: Access Control
Domain 2: Telecommunications and Network Security
Domain 3: Information Security and Risk Management
Domain 4: Application Security
Domain 5: Cryptography
Domain 6: Security Architecture and Design
Domain 7: Operations Security
Domain 8: Business Continuity Planning and Disaster Recovery Planning
Domain 9: Law, Regulations, Compliance, and Investigation
Domain 10: Physical Security
Though all of the topics are interesting, from the perspective of emerging trends and technologies, the most interesting chapters are ‘Managing Mobile Device Security,’ ‘Best Practices in Virtualization Security,’ ‘A Brief Summary of Warfare and Commercial Entities,’ and ‘Cyberstalking.’ These four chapters resonate most with information security practitioners because each of these topics takes the form of a trend that occurs increasingly in both the news and in trade journals.
I recommend this book, not only to information security practitioners but also to managers, executives, attorneys, risk managers, and technology operators. The book covers a significant number of important topics that are both timely and relevant to the contemporary practices one finds in daily life when performing a security duty within the discipline of information security.
―Eric W. Yocam in Computing Reviews, July 2011
Harold F. Tipton, HFT Associates, Villa Park, California, USA
Micki Krause Nozaki, Pacific Life Insurance Company, Newport Beach, California, USA
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Spese di spedizione:
EUR 25,00
Da: Germania a: U.S.A.
Spese di spedizione:
EUR 18,53
Da: Regno Unito a: U.S.A.
Da: Leserstrahl (Preise inkl. MwSt.), Oldenbüttel, Germania
Hardcover. Condizione: Fine. 6. leichte Gebrauchsspuren / minor wear---. nein. Codice articolo 94533
Quantità: 1 disponibili
Da: Goulds Book Arcade, Sydney, Newtown, Sydney, NSW, Australia
Hard Cover. Condizione: Very Good. Condizione sovraccoperta: No Dust Jacket. Sixth Edition. 2010. Sixth Edition. This is ONLY volume 4. The cover has light wear. 517 pages. Books listed here are not stored at the shop. Please contact us if you want to pick up a book from Newtown. Size: Size G: 10"-11" Tall (254-279mm). Codice articolo 136828
Quantità: 1 disponibili
Da: WeBuyBooks, Rossendale, LANCS, Regno Unito
Condizione: Good. Most items will be dispatched the same or the next working day. Ex library copy with usual stamps & stickers. Codice articolo wbs3636303784
Quantità: 1 disponibili
Da: Chiron Media, Wallingford, Regno Unito
Hardcover. Condizione: New. Codice articolo 6666-TNFPD-9781439819029
Quantità: 5 disponibili
Da: moluna, Greven, Germania
Gebunden. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Harold F. Tipton, HFT Associates, Villa Park, California, USAMicki Krause Nozaki, Pacific Life Insurance Company, Newport Beach, California, USAEvery year, in response to advancements in technolo. Codice articolo 595834490
Quantità: Più di 20 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Hardcover. Condizione: Brand New. 6th edition. 600 pages. 10.28x7.32x1.30 inches. In Stock. Codice articolo __1439819025
Quantità: 1 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Hardback. Condizione: New. New copy - Usually dispatched within 4 working days. Codice articolo B9781439819029
Quantità: 1 disponibili