Information Security Management Handbook

by ;
Format: Hardcover
Pub. Date: 2000-10-01
Publisher(s): Auerbach Pub
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $73.45

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

(Aurbach) Addresses emerging trends and new concepts in information security and security methodologies for emerging technologies. Topics covered include intrusion detection, penetration testing, secure voice communications, and network security.

Table of Contents

Introduction xi
DOMAIN 1 ACCESS CONTROL SYSTEMS AND METHODOLOGY 1(50)
Section 1.1 Access Control Issues
Single Sign-on
5(28)
Ross Leo
Section 1.2 Access Control Administration
Centralized Authentication Services (Radius, Tacacs, Diameter)
33(18)
Bill Stackpole
DOMAIN 2 TELECOMMUNICATIONS AND NETWORK SECURITY 51(146)
Section 2.1 Network Security
E-mail Security
55(28)
Bruce A. Lobree
Integrity and Security of ATM
83(16)
Steve Blanding
An Introduction to Secure Remote Access
99(18)
Christina M. Bird
Packet Sniffers and Network Monitors
117(30)
James S. Tiller
Bryan D. Fish
Section 2.2 Internet, Intranet, and Extranet Security
Enclaves: The Enterprise as an Extranet
147(14)
Bryan T. Koch
IPSec Virtual Private Networks
161(36)
James S. Tiller
DOMAIN 3 SECURITY MANAGEMENT PRACTICES 197(52)
Section 3.1 Security Awareness
Penetration Testing
201(20)
Stephen Fried
Section 3.2 Policies, Standards, Procedures, and Guidelines
The Building Blocks of Information Security
221(20)
Ken M. Shaurette
Section 3.3 Risk Management
The Business Case for Information Security: Selling Management on the Protection of Vital Secrets and Products
241(8)
Sanford Sherizen
DOMAIN 4 APPLICATIONS AND SYSTEMS DEVELOPMENT SECURITY 249(108)
Section 4.1 Application Security
PeopleSoft Security
253(18)
Satnam Purewal
World Wide Web Application Security
271(20)
Sean Scanlon
Common System Design Flaws and Security Issues
291(14)
William Hugh Murray
Section 4.2 System Security
Data Marts and Data Warehouses: Keys to the Future or Keys to the Kingdom?
305(30)
M. E. Krehnke
D. K. Bradley
Mitigating E-business Security Risks: Public Key Infrastructures in the Real World
335(22)
Douglas C. Merrill
Eran Feigenbaum
DOMAIN 5 CRYPTOGRAPHY 357(78)
Section 5.1 Crypto Technology and Implementations
Introduction to Encryption
361(18)
Jay Heiser
Three New Models for the Application of Cryptography
379(16)
Jay Heiser
Methods of Attacking and Defending Cryptosystems
395(20)
Joost Houwen
Message Authentication
415(20)
James S. Tiller
DOMAIN 6 SECURITY ARCHITECTURE AND MODELS 435(14)
Section 6.1 System Architecture and Design
Introduction to UNIX Security for Security Practitioners
439(10)
Jeffery J. Lowder
DOMAIN 7 OPERATIONS SECURITY 449(48)
Section 7.1 Threats
Hacker Tools and Techniques
453(22)
Ed Skoudis
An Introduction to Hostile Code and Its Control
475(22)
Jay Heiser
DOMAIN 8 BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING 497(26)
Section 8.1 Business Continuity Planning
The Business Impact Assessment Process
501(22)
Carl B. Jackson
DOMAIN 9 LAW, INVESTIGATION, AND ETHICS 523(84)
Section 9.1 Investigation
Computer Crime Investigations: Managing a Process Without Any Golden Rules
527(22)
George Wade
CIRT: Responding to Attack
549(20)
Chris Hare
Improving Network Level Security Through Real-Time Monitoring and Intrusion Detection
569(28)
Chris Hare
Operational Forensics
597(10)
Michael J. Corby
Index 607

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.