ABSTRACT

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook

part |2 pages

DOMAIN 2: TELECOMMUNICATIONS AND NETWORKS SECURITY

part |2 pages

DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT

part |2 pages

DOMAIN 4: APPLICATION SECURITY

chapter 15|10 pages

Mashup Security

chapter 16|8 pages

Format String Vulnerabilities

chapter 17|8 pages

Fast Scanning Worms

part |2 pages

DOMAIN 5: CRYPTOGRAPHY

chapter 18|10 pages

Message Digests

part |2 pages

DOMAIN 6: SECURITY ARCHITECTURE AND DESIGN

part |2 pages

DOMAIN 7: OPERATIONS SECURITY

chapter 22|8 pages

Validating Tape Backups

part |2 pages

DOMAIN 8: BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING

part |2 pages

DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATION

chapter 25|10 pages

Bluesnarfing