DEC 31, 1969

Web Seminars

Business Intelligence that is all about the customer
Available On Demand
Digital mesh or digital mess? Prepping for the future of IoT management
Available On Demand
The role of analytics in cyber security
December 13, 2016

Information Security Management Handbook, Fourth Edition

Print
Reprints
Email

In response to new developments in information technologies, this second volume supplements the fourth edition with new information, covering access control issues; authentication services; network security--which includes ATM, frame relay, remote access, network monitoring, and TCP/IP; intrusion detection; penetration testing; secure voice communications; cryptography; security architecture and models; operations security; business continuity planning; and law and ethics. The format continues to follow the standard for Certified Information Systems Security (CISSP) professional certification examination. Contributors are all specialists in computer security systems for various corporations, and/or are associated with CISSP.

Click here to buy this book

Please note you must now log in with your email address and password.