To access the contents, click the chapter and section titles.
Handbook of Information Security Management
(Imprint: Auerbach Publications)
(Publisher: CRC Press LLC)
Authors: Micki Krause, Harold F. Tipton
ISBN: 0849399475
This edition was placed with authorisation of Auerbach Publications
Here you may find a 4th edition of this book
- Introduction
- Contributors
- Domain 1Access Control
- Section 1-1Access Control Principles and Objectives
- Chapter 1-1-1Types of Information Security Controls
- Chapter 1-1-2Purposes of Information Security Management
- Section 1-2Access Control Issues
- Chapter 1-2-1Biometric Identification
- Chapter 1-2-2When Technology and Privacy Collide
- Chapter 1-2-3Relational Data Base Access Controls Using SQL
- Section 1-3Access Control Administration
- Chapter 1-3-1Implementation of Access Controls
- Chapter 1-3-2Implementing Kerberos in Distributed Systems
- Domain 2Communications Security
- Section 2-1Telecommunications Security Objectives, Threats, and Countermeasures
- Chapter 2-1-1The Self-Hack Audit
- Section 2-2Network Security
- Chapter 2-2-1A New Security Model for Networks and the Internet
- Chapter 2-2-2An Introduction to LAN/WAN Security
- Section 2-3Internet Security
- Chapter 2-3-1Security Management for the World Wide Web
- Chapter 2-3-2Internet Firewalls
- Domain 3Risk Management and Business Continuity Planning
- Section 3-1Risk Analysis
- Chapter 3-1-1Risk Analysis and Assessment
- Section 3-2Business Continuity Planning
- Chapter 3-2-1Business Continuity in Distributed Environments
- Section 3-3Distributed Systems BCP
- Chapter 3-3-1The Business Impact Assessment Process
- Domain 4Policy, Standards, and Organization
- Section 4-1Information Classification
- Chapter 4-1-1Information Classification: A Corporate Implementation Guide
- Section 4-2Security Awareness
- Chapter 4-2-1Information Warfare and the Information Systems Security Professional
- Section 4-3Organization Architecture
- Chapter 4-3-1New Organizational Model for IP Practitioners
- Chapter 4-3-2Enterprise Security Architecture
- Section 4-4Policy Development
- Chapter 4-4-1Policy Development
- Domain 5Computer Architecture and System Security
- Section 5-1Computer Organization and Configuration
- Chapter 5-1-1Secure Systems Architecture
- Section 5-2Microcomputer and LAN Security
- Chapter 5-2-1Microcomputer and LAN Security
- Section 5-3System Security
- Chapter 5-3-1Systems Integrity Engineering
- Domain 6Law, Investigation, and Ethics
- Section 6-1Legal and Regulatory Issues
- Chapter 6-1-1Computer Abuse Methods and Detection
- Chapter 6-1-2Federal and State Computer Crime Laws
- Section 6-2Investigation
- Chapter 6-2-1Computer Crime Investigation and Computer Forensics
- Section 6-3Information Ethics
- Chapter 6-3-1Computer Ethics
- Domain 7Application Program Security
- Section 7-1Application Security
- Chapter 7-1-1Role-Based Access Control in Real Systems
- Chapter 7-1-2Security Models for Object-Oriented Data Bases
- Domain 8Cryptography
- Section 8-1Cryptography Applications and Uses
- Chapter 8-1-1Cryptography and Escrowed Encryption
- Domain 9Computer Operations Security
- Section 9-1Operator, Hardware, and Media Controls
- Chapter 9-1-1Operations Security and Controls
- Domain 10Physical Security
- Section 10-1Threats and Facility Requirements
- Chapter 10-1-1Physical Security
- Section 10-2Personnel Physical Access Control
- Chapter 10-2-1Information Security and Personnel Practices
- Section 10-3Microcomputer Physical Security
- Chapter 10-3-1Protecting the Portable Computing Environment
- Index
|