By Harold F. Tipton,Micki Krause Nozaki

Updated every year, the Information safeguard administration guide, 6th version, quantity 6 is the main complete and updated reference on hand on info safety and coverage. Bringing jointly the information, abilities, ideas, and instruments required of IT safety pros, it enables the up to date knowing required to stick one step sooner than evolving threats, criteria, and rules.



Reporting at the most up-to-date advancements in info protection and up to date alterations to the (ISC) CISSP universal physique of data (CBK®), this quantity positive factors new details on complex power threats, HIPAA requisites, social networks, virtualization, and SOA. Its accomplished assurance touches on the entire key components IT safety pros want to know, including:





  • Access keep watch over: applied sciences and management together with the necessities of present laws

  • Telecommunications and community safeguard: Addressing the net, intranet, and extranet

  • Information defense and threat administration: Organizational tradition, getting ready for a safety audit, and the hazards of social media

  • Application protection: Ever-present malware threats and development protection into the improvement process

  • Security structure and layout: ideas of layout together with zones of belief

  • Cryptography: Elliptic curve cryptosystems, format-preserving encryption

  • Operations protection: occasion research

  • Business Continuity and catastrophe restoration making plans: enterprise continuity within the cloud

  • Legal, laws, Compliance, and research: power threats and incident reaction within the digital realm

  • Physical protection: crucial facets of actual security



The ubiquitous nature of desktops and networks will regularly give you the chance and capacity to do damage. This variation updates its well known predecessors with the data you must tackle the vulnerabilities created via contemporary thoughts similar to cloud computing, cellular banking, electronic wallets, and near-field communications. This instruction manual is usually to be had on CD.

Show description

Read or Download Information Security Management Handbook, Sixth Edition, Volume 6 PDF

Best information technology books

Program Management: A Life Cycle Approach (Best Practices and Advances in Program Management)

Software administration is a quickly rising offshoot of venture administration. rather a lot in order that AT&T, IBM, and different firms, either huge and small in all sectors, have initiated a push to certify software managers. And, even supposing universities provide classes in software administration, there are few books to be had to lead software managers via this box that calls for a large point of information and adventure.

Program Management Leadership: Creating Successful Team Dynamics (Best Practices and Advances in Program Management)

This isn't one other how-to advisor for software managers or one other reiteration of the venture administration Institute’s criteria for application administration. as an alternative, application administration management: growing winning crew Dynamics examines numerous management methods and illustrates the price of powerful management types in software Management for reaching software and venture luck.

Data Resource Data: A Comprehensive Data Resource Understanding

Are you suffering to realize a radical figuring out of your organization's information source? Are you discovering that your facts source has develop into relatively disparate via lack of information? Are you having trouble constructing significant meta-data approximately your facts source, or realizing the meta-data which were constructed?

Learning Elasticsearch

Key FeaturesGet to grips with the fundamentals of Elasticsearch thoughts and its APIs, and use them to create effective applicationsCreate large-scale Elasticsearch clusters and practice analytics utilizing aggregationThis entire advisor gets you up and working with Elasticsearch five. x in no timeBook DescriptionElasticsearch is a contemporary, quickly, disbursed, scalable, fault tolerant, and open resource seek and analytics engine.

Additional resources for Information Security Management Handbook, Sixth Edition, Volume 6

Example text

Download PDF sample

Rated 4.81 of 5 – based on 24 votes