๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information security management handbook

โœ Scribed by Harold F. Tipton, Micki Krause (editors)


Publisher
Auerbach Publications
Year
2002
Tongue
English
Leaves
1018
Edition
4
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.
The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it.
Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.


๐Ÿ“œ SIMILAR VOLUMES


Information security management handbook
โœ Harold F. Tipton, Micki Krause (editors) ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Auerbach Publications ๐ŸŒ English

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati

Information security management handbook
โœ Harold F. Tipton, Micki Krause (editors) ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Auerbach Publications ๐ŸŒ English

Whether you are active in security management or studying for the CISSP exam, you need accurate information you can trust. A practical reference and study guide, <em>Information Security Management Handbook, Fourth Edition, Volume 3</em> prepares you not only for the CISSP exam, but also for your wo

Information security management handbook
โœ Harold F. Tipton, Micki Krause (editors) ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Auerbach Publications ๐ŸŒ English

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati

Information security management handbook
โœ Harold F. Tipton, Micki Krause (editors) ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Auerbach Publications ๐ŸŒ English

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati

Information security management handbook
โœ Harold F. Tipton, Micki Krause (editors) ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Auerbach Publications ๐ŸŒ English

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati

Information security management handbook
โœ Harold F. Tipton, Micki Krause (editors) ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Auerbach Publications ๐ŸŒ English

The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technolo