Information Security Management Handbook, 6/e, Volume 3 (Hardcover)
暫譯: 資訊安全管理手冊,第6版,第三卷(精裝本)
Harold F. Tipton, Micki Krause
- 出版商: Auerbach Publication
- 出版日期: 2009-06-01
- 售價: $3,320
- 貴賓價: 9.5 折 $3,154
- 語言: 英文
- 頁數: 392
- 裝訂: Hardcover
- ISBN: 1420090925
- ISBN-13: 9781420090925
-
相關分類:
資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$650$585 -
$1,120$1,098 -
$950Assembly Language for Intel-Based Computers, 5/e (IE) (美國版ISBN:0132383101)
-
$550$435 -
$980$774 -
$2,300$2,185 -
$820$648 -
$620$490 -
$1,558Introduction to Algorithms, 3/e (IE-Paperback)
-
$680$537 -
$640$506 -
$520$442 -
$680$578 -
$750$593 -
$600$588 -
$630$498 -
$580$458 -
$650$514 -
$520$442 -
$650$514 -
$580$493 -
$820$648 -
$550$435 -
$530$419 -
$890$703
相關主題
商品描述
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.
Captures the crucial elements of the CBK
Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.
Also available on CD-ROM
Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow’s hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.
商品描述(中文翻譯)
每年,隨著不同國家和地區的新技術和新法律的出現,所有IT安全專業人員所需的基本知識、技能、技術和工具都會發生變化。隨著技術領域變化的速度越來越快,《資訊安全管理手冊》(Information Security Management Handbook)每年更新,已成為所有IT安全計劃和認證的標準。它反映了全球IT安全專業人員需要了解的共同知識體系(Common Body of Knowledge, CBK)的新更新。
**捕捉CBK的關鍵要素**
本書探討CBK的十個領域,包括存取控制、電信和網路安全、資訊安全和風險管理、應用安全以及密碼學。此外,專家貢獻者還討論了安全架構和設計、運營安全、業務持續計劃和災難恢復計劃。本書還涵蓋法律法規、合規性、調查和物理安全。在這本處理資訊安全管理和技術面向的論文集裡,貢獻者探討了各種主題,如隨處計算、虛擬化、podslurping、量子計算、混合應用、藍牙竊取、行動裝置盜竊、社交計算、投票機不安全性和格式字串漏洞。
**也可在CD-ROM上獲得**
保護資訊仍然是所有IT專業人員的重要關注點。隨著新風險威脅我們系統的安全,負責保護這些資訊的人必須不斷更新他們的知識裝甲,以防範明天的駭客和軟體漏洞。這本全面的《手冊》,也以可完全搜尋的CD-ROM格式提供,讓IT專業人員隨時掌握安全領域的新發展,並強化永恆的概念,為他們提供最佳的資訊、指導和建議。