logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Information Security Management Handbook, Volume 4

Information Security Management Handbook, Volume 4 (Hardcover, 6)

Harold F. Tipton, Micki Krause (엮은이)
Auerbach Publications
342,560원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
280,890원 -18% 0원
14,050원
266,840원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Information Security Management Handbook, Volume 4
eBook 미리보기

책 정보

· 제목 : Information Security Management Handbook, Volume 4 (Hardcover, 6) 
· 분류 : 외국도서 > 경제경영 > 무역
· ISBN : 9781439819029
· 쪽수 : 529쪽
· 출판일 : 2010-06-22

목차

DOMAIN 1: ACCESS CONTROL
Access Control Administration
Back to the Future, Paul A. Henry

DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY
Communications and Network Security
Adaptive Threats and Defenses, Sean Price
Achieving Global Information Systems Transformation (GIST) through Standards: Foundations for Standards-Based Network Visibility via IF-MAP and Beyond, David O'Berry
A Primer on De-mystifying US Government Networks, Samuel Chun, CISSP
Network Attacks and Countermeasures
Anti-spam: Bayesian Filtering, George Jahchan

DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT
Security Management Concepts and Principles
Measuring Information Security and Privacy Training and Awareness Effectiveness, Rebecca Herold
Managing Mobile Device Security, E. Eugene Schultz and Gal Shpantzer
Establishing an Information Security Program for Local Government, Robert Pittman

Policies, Standards, Procedures and Guidelines
A Business Case for ISO 27001 Certification, Tom Carlson and Robert Forbes
Achieving PCI DSS Compliance: A Compliance Review, Bonnie Goins Pilewski and Christopher A. Pilewski

Risk Management
Leveraging IT Control Frameworks for Compliance, Todd Fitzgerald, CISSP, CISA, CISM, ISO27000, CGEIT
Rats in the Cellar and Bats in the Attic, Not Enough Depth to My Security, Ken Shaurette
The Outsourcing of IT: Seeing the Big Picture, Foster Henderson
Understanding Information Risk Management, Tom Carlson and Nick Halvorson
The Sarbanes-Oxley Revolution: Hero or Hindrance? Seth Kinnett

DOMAIN 4: APPLICATION SECURITY
System Development Controls
Data Loss Prevention Program, Powell Hamilton
Data Reliability: Trusted Time Stamps, Jeff Stapleton
Security in the.NET Framework, James D. Murray

DOMAIN 5: CRYPTOGRAPHY
Crypto Concepts, Methodologies and Practices
Cryptography: A Unifying Principle in Compliance Programs, Ralph Spencer Poore

DOMAIN 6: SECURITY ARCHITECTURE & DESIGN
Principles of Computer and Network Organizations, Architectures and Designs
Best Practices in Virtualization Security, Shanit Gupta
Everything New Is Old Again, Robert M. Slade

DOMAIN 7: OPERATIONS SECURITY
Operations Controls
A Brief Summary of Warfare and Commercial Entities, Rob Shein
Information Destruction Requirements and Techniques, Ben Rothke

DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING
Business Continuity Planning
Integrated Business Continuity Planning, James Murphy
CERT/BERT: Community and Business Emergency Response, Carl Jackson

DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATION
Major Categories of Computer Crime
Cyberstalking, Micki Krause

Incident Handling
Is Software Write Blocking a Viable Alternative to Hardware Write Blocking in Computer Forensics? Paul A. Henry

DOMAIN 10: PHYSICAL SECURITY
Elements of Physical Security
Protection of Sensitive Data, Sandy Bacik
Water Leakage and Flooding, Sandy Bacik
Site Selection and Facility Design Considerations, Sandy Bacik
An Overview of IP-based Video Surveillance, Leo Kahng

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책