ABSTRACT

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i

chapter 1|12 pages

Insight into Intrusion Prevention Systems

chapter 3|16 pages

Identity Theft

chapter 4|10 pages

Network Security Overview

chapter 6|10 pages

Putting Security in the Transport: TLS

chapter 7|12 pages

Access Control Using RADIUS

chapter 9|14 pages

Voice-over-IP Security Issues

chapter 10|12 pages

Secure Web Services: Holes and Fillers

chapter 11|6 pages

Insecurity by Proxy

chapter 12|8 pages

Wireless Security

chapter |4 pages

Domain 3: Security Management Practices

chapter 13|8 pages

Validating Your Business Partners

chapter 20|12 pages

Understanding CRM

chapter |4 pages

Domain 4: Application Program Security

chapter 21|12 pages

Cross-Site Scripting (XSS)

chapter 22|12 pages

Stack-Based Buffer Overflows

chapter |4 pages

Domain 5: Cryptography

chapter 26|10 pages

Cryptographic Key Management Concepts

chapter 27|10 pages

Creating a Secure Architecture

chapter |4 pages

Domain 7: Operations Security

chapter 29|14 pages

WLAN Security Update

chapter 30|12 pages

Operations Security Abuses

chapter 32|16 pages

Security Patch Management: The Process

chapter 36|14 pages

ISPs and Accountability

chapter 37|20 pages

Spyware, Spooks, and Cyber-Goblins

chapter 38|6 pages

Honeypot Essentials

chapter 39|12 pages

Obscuring URLs

chapter |4 pages

Domain 10: Physical Security

chapter 40|16 pages

Personnel Security Screening