Information Security Management Handbook, Fourth Edition, Volume 2 / Edition 2

Information Security Management Handbook, Fourth Edition, Volume 2 / Edition 2

4.0 1
by Harold F. Tipton, Micki Krause, Micki Krause
     
 

The runaway growth of computer viruses and worms and the ongoing nuisa nce posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an org anization's security system an issue of prime importance. And informat ion systems technology is advancing at a frenetic pace. Against this b ackground,

See more details below

Overview

The runaway growth of computer viruses and worms and the ongoing nuisa nce posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an org anization's security system an issue of prime importance. And informat ion systems technology is advancing at a frenetic pace. Against this b ackground, the challenges facing information security professionals ar e increasing rapidly. Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in th e security of information systems.

Product Details

ISBN-13:
9780849308000
Publisher:
Taylor & Francis
Publication date:
10/20/2000
Edition description:
Older Edition
Pages:
640
Product dimensions:
6.36(w) x 9.58(h) x 1.42(d)

Table of Contents

Access Control Systems and Methodology

Access Control Issues

Access Control Administration

Telecommunications and Network Security

Network Security

Internet, Intranet, and Extranet Security

Voice Communications

Security Management Practices

Security Awareness

Policies, Standards, Procedures, and Guidelines

Risk Management

Applications and Systems Development Security

Application Security

System Security

Cryptography

Crypto Technology and Implementations

Security Architecture and Models

Microcomputer and LAN Security

Systems Architecture and Design

Operations Security

Threats

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning

Law, Investigations, and Ethics

Investigation

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >