Processing ......
Links to Free Computer, Mathematics, Technical Books all over the World
Information Security Management Handbook
🌠 Top Free Machine Learning Books - 100% Free or Open Source!
  • Title: Information Security Management Handbook
  • Author(s) Micki Krause, Harold F. Tipton
  • Publisher: CRC Press, LLC
  • Hardcover: 1080 pages
  • eBook: PDF
  • Language: English
  • ISBN-10: 0849399475
  • ISBN-13: 9781439892091
  • ASIN: N/A
  • Share This:  

Book Description

Updated annually, this book is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications.

  • Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals
  • Updates its bestselling predecessors with new developments in information security and the (ISC)2 CISSP CBK
  • Provides valuable insights from leaders in the field on the theory and practice of computer security technology
  • Facilitates the comprehensive and up-to-date understanding you need to stay fully informed
About the Authors
  • Micki Krause Nozaki, CISSP, has held positions in the information security profession for the past 20 years. She was previously the chief information security officer at Pacific Life Insurance Company in Newport Beach, California, where she was accountable for directing their information protection and security program enterprisewide.
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Computer Security Handbook (Seymour Bosworth, et al.)

    This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.

  • Security of Ubiquitous Computing Systems (Gildas Avoine, et al)

    It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Rational Cybersecurity for Business (Daniel Blum)

    This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

Book Categories
Other Categories
Resources and Links