Handbook of Information Secutity Management
Harold F. Tipton, Micki Krause
Taylor & Francis, Nov 9, 1998 - Computers - 784 pages
Completely revised and updated, the 1999 edition of Handbook of Information Security Management reveals the precise nuts and bolts of exactly how to handle all the most challenging security problems.
Handbook of Information Security Management provides dozens of case studies and analyses showing your students exactly how to protect systems and data using the latest tools. With Handbook of Information Security Management, your students will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
Handbook of Information Security Management delivers in-depth guidance on:
Zeroing in on latebreaking technical security issues, the book shows your students:
Here your students will find complete information on microcomputer and LAN security, security for the World Wide Web, biometric identification, enterprise security architecture, implementing and managing network-based controls, using cryptography to secure communications and commercial transactions, and much more.
In sum, Handbook of Information Security Management 1999 Edition will show your students how to secure systems against all intruders and security threats - no matter where they come from.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Section 12 Access Control Administration
TELECOMMUNICATIONS AND NETWORK
Section 22 Internet Intranet and Extranet Security
16 other sections not shown
Other editions - View all
access control administration algorithm application architecture assets attack audit authentication automated backup biometric block cipher boot sector brute force attack Business Continuity Planning cipher client client-server communications Computer Ethics Computer Security confidentiality configuration connection cost cryptography cryptovariable data base defined desktop discretionary access control disk distributed document electronic employees encryption ensure environment example execute Exhibit firewall functions GSSAPI hardware host identify impact implementation information security integrity internal Internet IPSEC ISAKMP Kerberos key management keystream logs mechanisms ment operating system organization organization's packets password personal computer physical potential problem procedures protection protocol public key responsible result risk assessment safeguards security policy sensitive server sniffer specific standard storage threat tion trade secrets trusted unauthorized virus viruses vulnerabilities workstation