WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/1075079006

Information Security Management Handbook, Volume 3

A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics. The Handbook has become the standard on which all IT security programs and certifications are based, making it.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "Information security management handbook"
  • "Handbook of information security management 1999"
  • "ISMH"
  • "Information security management handbook 2003"@en
  • "Handbook of information security management"
  • "Information security management"
  • "Information Security Management Handbook on CD-ROM, 2004 Edition"@en
  • "Information security management handbook on CD-ROM"
  • "Information security management handbook on CD-ROM"@en
  • "Information security management handbook on 2003"@en

http://schema.org/description

  • ""Reflecting the latest changes to information security and the CISSP Common Body of Knowledge (CBK) ... updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptative threat defense, Web 2.0, virtualization, data leakage, and governance. New material also adress risk management, business continuity planning, disaster recovery planning, and cryptography ... The CD-ROM includes an extra volume's worth of information -- including chapters from other security and networking books that have never appeared in the print editions." -- Información del estuche."
  • "This is the latest version of one of the most important books for security professionals and others taking the CISSP examination as well as for people who use the Handbook as a reference. The changes in technology in information security and the increasing threats to security from open systems is creating a new industry. This update to the handbook is a stand alone reference for anyone involved in the security of information systems as well as preparation for those taking the CISSP certification examination."
  • "Updated annually, the Information Security Management Handbook is the most comprehensive and up-to-date reference available on information security and risk management. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. This 2012 CD-ROM Edition contains the complete contents of every annual edition of the handbook since 1997, including 2012."
  • "Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a "must have" book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference."
  • "A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics. The Handbook has become the standard on which all IT security programs and certifications are based, making it."@en
  • "Explaining how to secure systems against all intruders and security threats, this guide covers useful for the CISSP exam prep and beyond and presents contributions from leading experts. Volume four covers topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection."@en
  • "This handbook can serve as a reference for information security practitioners and as a review to prepare for the Certified Information System Security Professional exam. The handbook maps 10 domains of the information security common body of knowledge, including access control systems and methodology, telecommunications and network security, crypto."@en
  • "With information, insight and all the essential details, this book is an indispensable reference for anyone working in information security and is also the definitive revision guide for the CISSP exam."@en
  • "Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a must-have book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference."@en
  • ""Reflecting the latest changes to information security and the CISSP common body of knowledge (CBK), the Information Security Management Handbook 2010 CD-ROM Edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography. Containing the complete contents of every annual edition since 1997, ... [it] is linked, searchable by keyword, and organized under the CBK domains. In addition to the complete contents of the 6,000 page set, the CD-ROM includes an extra volume's worth of information--including chapters from other security and networking books that have never appeared in the print editions."--Container."
  • "Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the "Information Security Management Handbook" addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the "Information Security Management Handbook, Sixth Edition" continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation."@en
  • "A compilation of the fundamental knowledge, skills, techniques, and tools required by security professionals. This book sets the standard on which all IT security programs and certifications are based. It includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide."@en
  • ""Multi-volume set of the Information Security Management Handbook... containing the complete contents of the set, you get a resource that is portable, linked and searchable by keyword, and organized under the CISSP Common Body of Knowledge (CBK) domains. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information--including chapters from other security and networking books that have never appeared in the print editions."--Container"
  • "Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ... must have ... book, both for preparing for the CISSP exam and as a c."@en

http://schema.org/genre

  • "Electronic resource"@en
  • "Electronic resource"
  • "Electronic books"
  • "Electronic books"@en
  • "Handbooks and manuals"
  • "Handbooks and manuals"@en
  • "Handbooks, manuals, etc"
  • "Online-Publikation"
  • "Matériel didactique"
  • "Livres électroniques"
  • "Ressources internet"

http://schema.org/name

  • "Information security management handbook [1]"
  • "Information Security Management Handbook, Volume 3"@en
  • "Information Security Management Handbook, Volume 3"
  • "Information security management handbook on CD-ROM"@en
  • "Information security management handbook on CD-ROM"
  • "Information security management handbook. Vol. 4"
  • "Information security management handbook. Volume 3"@en
  • "Information security management handbook : Volume 3"
  • "Information security management handbook handbook on CD-ROM 2006 ed"
  • "Information Security Management Handbook"@en
  • "Information Security Management Handbook"
  • "Information security management handbook"@en
  • "Information security management handbook"
  • "Information security management handbook / [Vol. 1]"
  • "Information security management : handbook on Cd-Rom"@en
  • "Information security management handbook Volume 4"
  • "Information security management : handbook"

http://schema.org/workExample