Description
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most
Table of Contents
Access Control. Access Control Techniques. Access Control Administration. Methods of Attack. Telecommunications & Network Security. Communications & Network Security. Internet, Intranet, Extranet Security. Network Attacks & Countermeasures. Information Security & Risk Management. Security Management Concepts & Principles. Policies, Standards, Procedures & Guidelines. Risk Management. Security Management Planning. Employment Policies & Practices. Application Security. Application Issues. System Development Controls. Malicious Code. Methods of Attack. Cryptography. Crypto Concepts, Methodologies & Practices. Security Architecture & Design. Principles of Computer & Network Organizations, Architectures & Designs. Operations Security. Operations Controls. Resource Protection Requirements. Business Continuity Planning & Disaster Recovery Planning. Business Continuity Planning. Disaster Recovery Planning. Legal, Regulations, Compliance & Investigation. Information Law. Major Categories of Computer Crime. Incident Handling. Physical Security. Elements of Physical Security.



