Information Security Management Handbook, Fifth Edition

Front Cover
CRC Press, Dec 30, 2003 - Computers - 2036 pages
3 Reviews
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.
  

What people are saying - Write a review

User Review - Flag as inappropriate

GOOD BOOK

User Review - Flag as inappropriate

Poor Firewall configuration

Contents

Contributors
xxiii
Introduction
xliii
1 Access Control Techniques
5
Whats New?
21
2 Access Control Administration
45
3 Identification and Authentication Techniques
61
4 Access Control Methodologies and Implementation
97
5 Methods of Attack
121
Securing Wireless Networks
329
Restraining the Insanity
339
Wireless LAN Security Challenge
349
ISOOSI Layers and Characteristics
363
2 InternetIntranetExtranet
373
IPSec Virtual Private Networks
383
An Effective Solution for Internet Security
407
Securing the Perimeter
413

A New Breed of Hacker Tools and Defenses
135
The Forgotten Risk
147
The Latest Hacker Attacks and Defenses
155
CounterEconomic Espionage
165
6 Monitoring and Penetration Testing
179
Penetration Testing
191
TELECOMMUNICATIONS NETWORK
197
Understanding SSL
203
Packet Sniffers and Network Monitors
217
Secured Connections to External Networks
235
Security and Network Technologies
249
Wired and Wireless Physical Layer Security Issues
269
Whats Not So Simple about SNMP?
287
Security from
297
Security and the Physical Network Layer
311
Security of Wireless Local Area Networks
319
Extranet Access Control Issues
423
ApplicationLayer Security Protocols for Networks
435
Security of Communication Protocols and Services
457
VPN Deployment and Evaluation Strategy
475
How to Perform a Security Review of a Checkpoint Firewall
493
Comparing Firewall Technologies
513
Cookies and Web Bugs
539
Wireless LAN Security
561
New Perspectives on VPNs
575
3 Email Security
601
Voice Security
617
Chapter 1 Enhancing Security through Biometric Technology by Stephen D Fried CISSP Lucent Tech
1374
Chapter 110 Message Authentication by James S Tiller CISA CISSP INS All rights reserved
1557
Chapter 142 Liability for Lax Computer Security in DDOS Attacks by Dorsey Morrow JD CISSP 2003
2003
Copyright

Common terms and phrases

References to this book

All Book Search results »

About the author (2003)

Krause, Manager Information Systems Security, Pacific Healtcare Services.

Bibliographic information