Information Security Management Handbook, Sixth Edition, Volume 7
- 8h 42m
- James S. Tiller (eds), Richard O'Hanley
- CRC Press
- 2014
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.
- Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals
- Updates its bestselling predecessors with new developments in information security and the (ISC)2® CISSP® CBK®
- Provides valuable insights from leaders in the field on the theory and practice of computer security technology
- Facilitates the comprehensive and up-to-date understanding you need to stay fully informed
The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications.
About the Editors
James S. Tiller, CISM, CISA, CISSP, is the Head of Security Consulting, Americas, HP Enterprise Security Services, Hewlett-Packard Company. Formerly Vice President of Security North America for BT Global Services, Jim has provided security solutions for global organizations for the past 20 years. He is the author of the following books published by Auerbach: CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits; Adaptive Security Management Architecture; and A Technical Guide to IPSec Virtual Private Networks.
Richard O'Hanley is the Publisher for Information and Communications Technology, Business, and Security at CRC Press.
In this Book
-
Securing the Grid
-
Attacks in Mobile Environments
-
Security in the Cloud
-
Getting the Best Out of Information Security Projects
-
Mobility and Its Impact on Enterprise Security
-
An Introduction to Digital Rights Management
-
Information Security on the Cheap
-
Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program
-
Metrics for Monitoring
-
Security Implications of Bring Your Own Device, IT Consumerization, and Managing User Choices
-
Information Assurance—Open Research Questions and Future Directions
-
Protecting Us from Us—Human Firewall Vulnerability Assessments
-
Service-Oriented Architecture
-
Managing the Security Testing Process
-
Security and Resilience in the Software Development Life Cycle
-
Cloud Cryptography
-
Identity and Access Management Architecture
-
FedRAMP—Entry or Exit Ramp for Cloud Security?
-
Data Storage and Network Security
-
National Patient Identifier and Patient Privacy in the Digital Era
-
Addressing Social Media Security and Privacy Challenges
-
What Is Digital Forensics and What Should You Know about It?
-
eDiscovery
-
Overview of the Steps of the Electronic Discovery Reference Model
-
Cell Phone Protocols and Operating Systems
-
Hacktivism—The Whats, Whys, and Wherefores
-
PCI Compliance
-
HIPAA/HITECH Compliance Overview
-
Information Security Management Handbook: Comprehensive Table of Contents