Limit this search to....

Information Security Management Handbook, Volume 4
Contributor(s): Tipton, Harold F. (Editor), Krause Nozaki, Micki (Editor)
ISBN: 1439819025     ISBN-13: 9781439819029
Publisher: Auerbach Publications
OUR PRICE:   $171.00  
Product Type: Hardcover - Other Formats
Published: June 2010
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Additional Information
BISAC Categories:
- Business & Economics | Commerce
- Computers | Information Technology
- Computers | Security - General
Dewey: 005.8
LCCN: 2006048504
Series: Information Security Management Handbook
Physical Information: 1.3" H x 6.9" W x 10" (2.45 lbs) 529 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.

Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP(R) Common Body of Knowledge (CBK(R)). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.

As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.