Information security management handbook Volume 7 Volume 7 /

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilit...

Descripción completa

Detalles Bibliográficos
Otros Autores: O'Hanley, Richard (-), Tiller, James S.
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton [Fla.] : CRC Press 2014.
Edición:6th ed
Colección:Information security ; Volume 7
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009634734206719
Tabla de Contenidos:
  • Front Cover; Contents; Introduction; Contributors; Chapter 1 - Securing the Grid; Chapter 2 - Attacks in Mobile Environments; Chapter 3 - Security in the Cloud; Chapter 4 - Getting the Best Out of Information Security Projects; Chapter 5 - Mobility and Its Impact on Enterprise Security; Chapter 6 - An Introduction to Digital Rights Management; Chapter 7 - Information Security on the Cheap; Chapter 8 - Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program; Chapter 9 - Metrics for Monitoring
  • Chapter 10 - Security Implications of Bring Your Own Device, IT Consumerization, and Managing User ChoicesChapter 11 - Information Assurance: Open Research Questions and Future Directions; Chapter 12 - Protecting Us from Us: Human Firewall Vulnerability Assessments; Chapter 13 - Service-Oriented Architecture; Chapter 14 - Managing the Security Testing Process; Chapter 15 - Security and Resilience in the Software Development Life Cycle; Chapter 16 - Cloud Cryptography; Chapter 17 - Identity and Access Management Architecture; Chapter 18 - FedRAMP: Entry or Exit Ramp for Cloud Security?
  • Chapter 19 - Data Storage and Network SecurityChapter 20 - National Patient Identifier and Patient Privacy in the Digital Era; Chapter 21 - Addressing Social Media Security and Privacy Challenges; Chapter 22 - What Is Digital Forensics and What Should You Know about It?; Chapter 23 - eDiscovery; Chapter 24 - Overview of the Steps of the Electronic Discovery Reference Model; Chapter 25 - Cell Phone Protocols and Operating Systems; Chapter 26 - Hacktivism: The Whats, Whys, and Wherefores; Chapter 27 - PCI Compliance; Chapter 28 - HIPAA/HITECH Compliance Overview
  • Information Security Management Handbook: Comprehensive Table of ContentsBack Cover