Information security management handbook Volume 7 Volume 7 /
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilit...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton [Fla.] :
CRC Press
2014.
|
Edición: | 6th ed |
Colección: | Information security ;
Volume 7 |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009634734206719 |
Tabla de Contenidos:
- Front Cover; Contents; Introduction; Contributors; Chapter 1 - Securing the Grid; Chapter 2 - Attacks in Mobile Environments; Chapter 3 - Security in the Cloud; Chapter 4 - Getting the Best Out of Information Security Projects; Chapter 5 - Mobility and Its Impact on Enterprise Security; Chapter 6 - An Introduction to Digital Rights Management; Chapter 7 - Information Security on the Cheap; Chapter 8 - Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program; Chapter 9 - Metrics for Monitoring
- Chapter 10 - Security Implications of Bring Your Own Device, IT Consumerization, and Managing User ChoicesChapter 11 - Information Assurance: Open Research Questions and Future Directions; Chapter 12 - Protecting Us from Us: Human Firewall Vulnerability Assessments; Chapter 13 - Service-Oriented Architecture; Chapter 14 - Managing the Security Testing Process; Chapter 15 - Security and Resilience in the Software Development Life Cycle; Chapter 16 - Cloud Cryptography; Chapter 17 - Identity and Access Management Architecture; Chapter 18 - FedRAMP: Entry or Exit Ramp for Cloud Security?
- Chapter 19 - Data Storage and Network SecurityChapter 20 - National Patient Identifier and Patient Privacy in the Digital Era; Chapter 21 - Addressing Social Media Security and Privacy Challenges; Chapter 22 - What Is Digital Forensics and What Should You Know about It?; Chapter 23 - eDiscovery; Chapter 24 - Overview of the Steps of the Electronic Discovery Reference Model; Chapter 25 - Cell Phone Protocols and Operating Systems; Chapter 26 - Hacktivism: The Whats, Whys, and Wherefores; Chapter 27 - PCI Compliance; Chapter 28 - HIPAA/HITECH Compliance Overview
- Information Security Management Handbook: Comprehensive Table of ContentsBack Cover