Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

Schou, Corey; Hernandez, Steven

McGraw-Hill Education - Europe

10/2014

480

Mole

Inglês

9780071821650

15 a 20 dias

822

Descrição não disponível.
Part IInformation Security Infrastructure
1:The Need for Information Security
2:Concepts in Informaiton Security
3:Assets, Threats, Vulnerabilities, Risks, and Controls
4:Security Professionals and Organizations
5:Information Security management System
6:Implementing Information Security Strategy into Current Practices, Regulations, and Plans
Part IIInformation Security Planning Process
7:Approaches to Implementing Information Security
8:Organizational Structure for Mananging Information Security
9:Asset Management
10:Information Security Risk Management
11:Information Security Policy
12:Human Resouce Security
13:Certification, Accreditation, and Assurance
Part IIIInformation Security Prevention Process
14:Information Security in System Development
15:Physical and Environmental Security Controls
16:Information Security Awareness, Training, and Education
17:Preventive Tools and Techniques
18:Access Control
Part IVInformation Security Detection Process
19:Information Security Monitoring Tools and Methods
20:Information Security Measurements and Metrics
Part VInformation Security Recovery Process
21:Information Security Incident Handling
22:Computer Forensics
23:Business Continuity
24:Backup and Restoration
Appendices
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
information assurance and security ethics, information assurance architecture, information assurance best practices, information assurance and risk management, computer security principles and practice, computer security and cryptography, information security infrastructure, information security planning, information security detection, information security and computer forensics, information security risk management, hacking, network security, network security hacks, network security monitoring, network security essentials, networking security systems Security, networking, Hacking Exposed, Hacking Exposed Web 2.0, Hacking Exposed VoIP, Hacking Exposed Windows, Hacking Exposed Web Applications, Hacking Exposed Cisco Networks, Gray Hat Hacking, Hacking Exposed Wireless, Hacking Exposed Computer Forensics, 19 Deadly Sins of Software Security, 24 Deadly Sins of Software Security, CCNA Cisco Certified Network Associate Study Guide, CCENT Cisco Certified Entry Networking Technician Study Guide, CCNA Cisco Certified Network Associate Wireless Study Guide, CISSP All-in-One Exam Guide, Mobile Application Security, Hacking Exposed Malware and Rootkits, Hacking Exposed Computer Forensics, Hacking Exposed Virtualization & Cloud Computing, IT Security Metrics, Security Information and Event Management (SIEM) Implementation, IT Auditing, CISSP Boxed Set, CISA Certified Information Systems Auditor All-in-One Exam Guide, Mike Meyers' CompTIA Security+ Certification Passport, Security+ All-in-One Exam Guide, CompTIA A+ Certification All-in-One Exam Guide, CCNA Cisco Certified Network Associate Security Study Guide, CWSP Certified Wireless Security Professional Official Study Guide, CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide, CTS Certified Technology Specialist Exam Guide