
365
Information Security
Management Handbook:
Comprehensive Table of
Contents
Domain 1 Access Control
Title
Volume
1 2 3 4 5 6 7
1.1 Access Control Techniques
A Look at RFID Security, Ben Rothke x
New Emerging Information Security
Technologies and Solutions, Tara Chand
x
Sensitive or Critical Data Access Controls,
Mollie E. Krehnke and David Krehnke
x
An Introduction to Role-Based Access
Control, Ian Clark
x
Smart Cards, Jim Tiller x
A Guide to Evaluating Tokens,
JosephT.Hootman
x
Controlling FTP: Providing Secured
Data Transfers, Chris Hare
x
Authentication Tokens, Paul A. Henry x
Authentication and the Role of Tokens,
Jeff Davis
x
continued