Handbook of Information Secutity Management

Front Cover
Harold F. Tipton, Micki Krause
Taylor & Francis, Nov 9, 1998 - Computers - 784 pages
0 Reviews
Completely revised and updated, the 1999 edition of Handbook of Information Security Management reveals the precise nuts and bolts of exactly how to handle all the most challenging security problems.
Handbook of Information Security Management provides dozens of case studies and analyses showing your students exactly how to protect systems and data using the latest tools. With Handbook of Information Security Management, your students will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
Handbook of Information Security Management delivers in-depth guidance on:
  • organizing a corporate information security function
  • creating a framework for developing security awareness throughout the company
  • analyzing and managing risk
  • developing a business continuity plan if disaster strikes
    Zeroing in on latebreaking technical security issues, the book shows your students:
  • proven ways to design and develop secure systems
  • methods to build safeguards into the system upfront, instead of adding them at a later date
  • expert tools and techniques commonly used to create the most secure systems
  • the most effective access controls as well as various models and techniques for user verification and automated intrusion detection
  • and the easiest way to prepare for certification exams administered by the ISC-2
    Here your students will find complete information on microcomputer and LAN security, security for the World Wide Web, biometric identification, enterprise security architecture, implementing and managing network-based controls, using cryptography to secure communications and commercial transactions, and much more.
    In sum, Handbook of Information Security Management 1999 Edition will show your students how to secure systems against all intruders and security threats - no matter where they come from.
  • From inside the book

    What people are saying - Write a review

    We haven't found any reviews in the usual places.

    Contents

    Section 12 Access Control Administration
    45
    TELECOMMUNICATIONS AND NETWORK
    83
    Section 22 Internet Intranet and Extranet Security
    139
    Copyright

    16 other sections not shown

    Common terms and phrases

    Bibliographic information