ABSTRACT

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.

The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it.

Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.

part 1|88 pages

Access Control Systems and Methodology

part 2|148 pages

Telecommunications and Network Security

chapter 6|14 pages

What’s Not So Simple about SNMP?

chapter 8|10 pages

New Perspectives on VPNs

chapter 12|16 pages

Voice Security

chapter 13|20 pages

Secure Voice Communications (Vol)

chapter 14|14 pages

Packet Sniffers: Use and Misuse

part |236 pages

Domain 3 Security Management Practices

chapter 17|12 pages

Security Management

chapter 20|12 pages

Security Assessment

chapter 28|12 pages

Ownership and Custody of Data

part |143 pages

Domain 4 Application Program Security

part 5|63 pages

Domain 5: Cryptography

chapter 35|26 pages

An Introduction to Cryptography

chapter 37|15 pages

PKI Registration

part 6|65 pages

Domain 6 Computer, System, and Security Architecture

part 7|14 pages

Operations Security

chapter 41|12 pages

Directory Security

part Domain 8|30 pages

Business Continuity Planning

part 9|110 pages

Domain 9 Law, Investigation, and Ethics

chapter 46|26 pages

The International Dimensions of Cyber-Crime

A Look at the Council of Europe’s Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime

chapter 47|14 pages

Reporting Security Breaches

chapter 48|17 pages

Incident Response Management

part 10|58 pages

Physical Security