ABSTRACT

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i

chapter 1|12 pages

Sensitive or Critical Data Access Controls

chapter 3|10 pages

Smart Cards

chapter 4|10 pages

A Guide to Evaluating Tokens

chapter 6|46 pages

An Examination of Firewall Architectures

chapter 9|6 pages

PBX Firewalls: Closing the Back Door

chapter 10|10 pages

Voice over WLAN

chapter 11|6 pages

Spam Wars: How To Deal with Junk E-Mail

chapter 13|4 pages

The Controls Matrix

chapter 14|6 pages

Information Security Governance

chapter 18|10 pages

Enterprise Security Management Program

chapter 21|14 pages

Building an Effective Privacy Program

chapter 25|16 pages

System Development Security Methodology

chapter 27|12 pages

Organized Crime and Malware

chapter 30|12 pages

An Overview of Quantum Cryptography

chapter 32|10 pages

Enterprise Assurance: A Framework Explored

chapter 33|16 pages

Managing Unmanaged Systems

chapter 34|10 pages

Understanding Service Level Agreements

chapter 36|6 pages

Identifying Critical Business Functions

chapter 38|8 pages

Contingency at a Glance

chapter 43|12 pages

The Ethical and Legal Concerns of Spyware

chapter 44|14 pages

The Evolution of the Sploit

chapter 45|8 pages

Computer Crime

chapter 46|20 pages

Phishing: A New Twist to an Old Game