Information Security Management Handbook, 6/e, Volume 3 (Hardcover) (資訊安全管理手冊,第六版,第三卷(精裝本))
Harold F. Tipton, Micki Krause
- 出版商: Auerbach Publication
- 出版日期: 2009-06-01
- 售價: $3,320
- 貴賓價: 9.5 折 $3,154
- 語言: 英文
- 頁數: 392
- 裝訂: Hardcover
- ISBN: 1420090925
- ISBN-13: 9781420090925
-
相關分類:
資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$650$585 -
$1,120$1,098 -
$950Assembly Language for Intel-Based Computers, 5/e (IE) (美國版ISBN:0132383101)
-
$550$435 -
$980$774 -
$2,280$2,166 -
$820$697 -
$620$490 -
$1,558Introduction to Algorithms, 3/e (IE-Paperback)
-
$680$537 -
$640$506 -
$520$442 -
$680$578 -
$750$593 -
$600$588 -
$630$498 -
$580$458 -
$650$514 -
$520$442 -
$650$514 -
$580$493 -
$820$648 -
$550$435 -
$530$419 -
$890$703
相關主題
商品描述
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.
Captures the crucial elements of the CBK
Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.
Also available on CD-ROM
Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow’s hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.
商品描述(中文翻譯)
每年,隨著不同國家和地區的新技術和新法律的出現,所有IT安全專業人員所需的基本知識、技能、技術和工具都會有所變化。隨著科技領域變化的迅速速度,每年更新的《資訊安全管理手冊》已成為所有IT安全計劃和認證的標準。它反映了全球所有IT安全專業人員需要了解的新的Common Body of Knowledge (CBK)的更新內容。
本書探索了CBK的十個領域,包括存取控制、電信和網路安全、資訊安全和風險管理、應用安全和密碼學。此外,專家貢獻者還討論了安全架構和設計、運營安全、業務連續性計劃和災難恢復計劃。本書還涵蓋了法律法規、合規性、調查和實體安全。在這本關於信息安全管理和技術方面的專著集中,貢獻者們探討了各種主題,如任何地點計算、虛擬化、盜取Pod、量子計算、混搭、藍牙竊聽、移動設備失竊、社交計算、投票機不安全和格式字串漏洞。
保護信息繼續是所有IT專業人員的重要關注。隨著新的風險威脅我們系統的安全,那些負責保護信息的人必須不斷更新他們的知識,以防範明天的黑客和軟件漏洞。這本全面的手冊,也可在完全可搜索的CD-ROM格式中提供,使IT專業人員了解安全領域的新發展,並強化永恆的概念,為他們提供最好的信息、指導和建議。