DEC 31, 1969

Web Seminars

Turning the IoT into opportunities
January 31, 2017

Information Security Management Handbook, Fourth Edition


In response to new developments in information technologies, this second volume supplements the fourth edition with new information, covering access control issues; authentication services; network security--which includes ATM, frame relay, remote access, network monitoring, and TCP/IP; intrusion detection; penetration testing; secure voice communications; cryptography; security architecture and models; operations security; business continuity planning; and law and ethics. The format continues to follow the standard for Certified Information Systems Security (CISSP) professional certification examination. Contributors are all specialists in computer security systems for various corporations, and/or are associated with CISSP.

Click here to buy this book

Please note you must now log in with your email address and password.