Information Security Management Handbook, Volume 6, 6th Edition

Book description

This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required by IT security professionals. It covers the CISSP Common Body of Knowledge (CBK) that forms the standard on which all IT security programs and certifications are based. Topics covered include access control, physical (environmental) security, cryptography, application security, and operations security. This new edition features the latest developments in information security and the (ISC)2 CISSP CBK, including advanced persistent threats, new HIPAA requirements, social networks, virtualization, and SOA.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Contents
  5. Introduction
  6. Editors
  7. Contributors
  8. DOMAIN 1: ACCESS CONTROL: Access Control Administration
    1. 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH
  9. DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY: Internet, Intranet, Extranet Security
    1. 2: E-Mail Security
  10. DOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT: Security Management Concepts and Principles
    1. 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program
  11. Risk Management
    1. 4: The Information Security Auditors Have Arrived, Now What?
    2. 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason
    3. 6: Social Networking
    4. 7: Insider Threat Defense
    5. 8: Risk Management in Public Key Certificate Applications
    6. 9: Server Virtualization: Information Security Considerations
  12. Security Management Planning
    1. 10: Security Requirements Analysis
    2. 11: CERT Resilience Management Model: An Overview
    3. 12: Managing Bluetooth Security
  13. Employment Policies and Practices
    1. 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions
    2. 14: A “Zero Trust” Model for Security
  14. DOMAIN 4: APPLICATION DEVELOPMENT SECURITY: System Development Controls
    1. 15: Application Whitelisting
    2. 16: Design of Information Security for Large System Development Projects
    3. 17: Building Application Security Testing into the Software Development Life Cycle
  15. Malicious Code
    1. 18: Twenty-Five (or Forty) Years of Malware History
  16. DOMAIN 5: CRYPTOGRAPHY: Cryptographic Concepts, Methodologies, and Practices
    1. 19: Format Preserving Encryption
    2. 20: Elliptic Curve Cryptosystems
    3. 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles
  17. DOMAIN 6: SECURITY ARCHITECTURE AND DESIGN: Principles of Computer and Network Organizations, Architectures, and Designs
    1. 22: Service-Oriented Architecture
    2. 23: Cloud Security
    3. 24: Enterprise Zones of Trust
  18. DOMAIN 7: OPERATIONS SECURITY: Operations Controls
    1. 25: Complex Event Processing for Automated Security Event Analysis
    2. 26: Records Management
  19. DOMAIN 8: BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING: Business Continuity Planning
    1. 27: Data Backup Strategies: Traditional versus Cloud
  20. DOMAIN 9: LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS: Major Categories of Computer Crime
    1. 28: Managing Advanced Persistent Threats
  21. Incident Handling
    1. 29: Virtualization Forensics
  22. DOMAIN 10: PHYSICAL (ENVIRONMENTAL) SECURITY: Elements of Physical Security
    1. 30: Terrorism: An Overview
  23. Technical Controls
    1. 31: Countermeasure Goals and Strategies
  24. Index
  25. Information Security Management Handbook: Comprehensive Table of Contents

Product information

  • Title: Information Security Management Handbook, Volume 6, 6th Edition
  • Author(s): Harold F. Tipton, Micki Krause Nozaki
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781466559103