ABSTRACT

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion

part |2 pages

Domain 1: Access Control Systems and Methodology

chapter 1|18 pages

It Is All about Control

chapter 3|8 pages

The Case for Privacy

chapter 5|22 pages

Counter-Economic Espionage

chapter 6|14 pages

What’s Not So Simple about SNMP?

chapter 8|10 pages

New Perspectives on VPNs

chapter 12|16 pages

Voice Security

chapter 14|14 pages

Packet Sniffers: Use and Misuse

part |2 pages

Domain 3. Security Management Practices

chapter 20|12 pages

Security Assessment

chapter 28|12 pages

Ownership and Custody of Data

part |2 pages

Domain 5: Cryptography

chapter 35|26 pages

An Introduction to Cryptography

chapter 37|16 pages

PKI Registration

part |2 pages

Domain 6. Computer, System, and Security Architecture

part |2 pages

Domain 7: Operations Security

part |2 pages

Domain 8: Business Continuity Planning

part |2 pages

Domain 9: Law, Investigation, and Ethics

chapter 47|14 pages

Reporting Security Breaches

chapter 48|18 pages

Incident Response Management

part |2 pages

DOMAIN 10 PHYSICAL SECURITY