A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati
Information security management handbook
โ Scribed by Harold F. Tipton, Micki Krause (editors)
- Publisher
- Auerbach Publications
- Year
- 2008
- Tongue
- English
- Leaves
- 425
- Edition
- 6
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.
๐ SIMILAR VOLUMES
Whether you are active in security management or studying for the CISSP exam, you need accurate information you can trust. A practical reference and study guide, <em>Information Security Management Handbook, Fourth Edition, Volume 3</em> prepares you not only for the CISSP exam, but also for your wo
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati
The <em>Information Security Management Handbook</em> continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, <em>Volume 4</em> supplements the previous volumes with new information covering topics such as
The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technolo