tailieunhanh - Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. | Information Security Management Handbook Sixth Edition VOLUME 2 i 11/29/2008/29/2008 5:33:205:33:20 PMPM OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Port-Based Authentication Information Security: Design, Implementation, Edwin Lyle Brown Measurement, and Compliance ISBN: 1-4200-4464-8 Timothy P. Layton ISBN: 0-8493-7087-6 Approach to Security in the Organization, Second Edition Information Security Architecture: An Integrated Jan Killmeyer Information Security Cost Management ISBN: 0-8493-1549-2 Ioana V. Bazavan and Ian Lim ISBN: 0-8493-9275-6 Audit and Trace Log Management: Information Security Fundamentals Consolidation and Analysis Thomas R. Peltier, Justin Peltier and John A. Blackley Phillip Q. Maier ISBN: 0-8493-1957-9 ISBN: 0-8493-2725-3 Information Security Management Handbook, The CISO Handbook: A Practical Guide to Sixth Edition Securing Your Company Harold F. Tipton and Micki Krause Michael Gentile, Ron Collette and Tom August ISBN: 0-8493-7495-2 ISBN: 0-8493-7943-1 Information Security Risk Analysis, CISO Leadership: Essential Principles for Success Second Edition Todd Fitzgerald adn Micki Krause Thomas R. Peltier ISBN: 0-8493-1952-8 ISBN: 0-8493-3346-6 Complete Guide to CISM Certification Insider Computer Fraud: An In-Depth Framework Thomas R. Peltier and Justin Peltier for Detecting and Defending against Insider IT ISBN: 0-849-35356-4 Attacks Kenneth Brancik Complete Guide to Security and Privacy ISBN: 1-4200-4659-4 Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Investigations in the Workplace Debra S. Herrmann Eugene F. Ferraro ISBN: 0-8493-5402-1 ISBN: 0-8493-1648-0 Computer Forensics: Evidence Collection Managing an Information Security and Privacy and Management Awareness and Training Program Robert C. Newman Rebecca Herold ISBN: 0-8493-0561-6 ISBN: 0-8493-2963-9 Cyber Crime Investigator s Field Guide, A Practical Guide to Security Assessments Second Edition Sudhanshu Kairab