Information Security Management Handbook, Fifth Edition

Front Cover
CRC Press, Dec 30, 2003 - Computers - 2036 pages
3 Reviews
The four-volume set of the Information Security Management Handbook is now available on CD-ROM. Containing the complete contents of the set, readers get a resource that is lightweight and portable, linked and searchable by keyword, and organized under the Common Body of Knowledge (CBK) domains. Exportable text and hard copies are available at the click of a mouse. In addition to the four volumes of the most comprehensive resource on information security management, the CD-ROM version provides an extra volume's worth of information that readers will not find anywhere else.
 

What people are saying - Write a review

User Review - Flag as inappropriate

GOOD BOOK

User Review - Flag as inappropriate

Poor Firewall configuration

Contents

Contributors
xxiii
Introduction
xliii
1 Access Control Techniques
5
Whats New?
21
2 Access Control Administration
45
3 Identification and Authentication Techniques
61
4 Access Control Methodologies and Implementation
97
5 Methods of Attack
121
Securing Wireless Networks
329
Restraining the Insanity
339
Wireless LAN Security Challenge
349
ISOOSI Layers and Characteristics
363
2 InternetIntranetExtranet
373
IPSec Virtual Private Networks
383
An Effective Solution for Internet Security
407
Securing the Perimeter
413

A New Breed of Hacker Tools and Defenses
135
The Forgotten Risk
147
The Latest Hacker Attacks and Defenses
155
CounterEconomic Espionage
165
6 Monitoring and Penetration Testing
179
Penetration Testing
191
TELECOMMUNICATIONS NETWORK
197
Understanding SSL
203
Packet Sniffers and Network Monitors
217
Secured Connections to External Networks
235
Security and Network Technologies
249
Wired and Wireless Physical Layer Security Issues
269
Whats Not So Simple about SNMP?
287
Security from
297
Security and the Physical Network Layer
311
Security of Wireless Local Area Networks
319
Extranet Access Control Issues
423
ApplicationLayer Security Protocols for Networks
435
Security of Communication Protocols and Services
457
VPN Deployment and Evaluation Strategy
475
How to Perform a Security Review of a Checkpoint Firewall
493
Comparing Firewall Technologies
513
Cookies and Web Bugs
539
Wireless LAN Security
561
New Perspectives on VPNs
575
3 Email Security
601
Voice Security
617
Chapter 1 Enhancing Security through Biometric Technology by Stephen D Fried CISSP Lucent Tech
1374
Chapter 110 Message Authentication by James S Tiller CISA CISSP INS All rights reserved
1557
Chapter 142 Liability for Lax Computer Security in DDOS Attacks by Dorsey Morrow JD CISSP 2003
2003
Copyright

Common terms and phrases

References to this book

All Book Search results »

About the author (2003)

Tipton, consultant, HFT Associates, Villa Park, California.

Krause, Manager Information Systems Security, Pacific Healtcare Services.

Bibliographic information