Coverart for item
The Resource Information security management handbook, Volume 3, Harold F. Tipton, Micki Krause, editors

Information security management handbook, Volume 3, Harold F. Tipton, Micki Krause, editors

Label
Information security management handbook, Volume 3
Title
Information security management handbook
Title number
Volume 3
Statement of responsibility
Harold F. Tipton, Micki Krause, editors
Contributor
Subject
Genre
Language
eng
Cataloging source
NhCcYBP
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I54165 2009
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
  • handbooks
Label
Information security management handbook, Volume 3, Harold F. Tipton, Micki Krause, editors
Link
http://www.byu.eblib.com/EBLWeb/patron/?target=patron&extendedid=P_570476_0
Instantiates
Publication
Note
Description based on print version record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier MARC source
rdacarrier
Content category
text
Content type MARC source
rdacontent
Contents
V. 3. Expanding PKI-based access control capabilities with attribute certificates / Alex Golod -- Five components on identity management systems / Kevin Castellow -- Security weaknesses of system and application interfaces used to process sensitive information / Sean M. Price -- Mobile data security / George G. McBride -- Enhanced security through open standards : a path to a stronger global digital ecosystem / David O'Berry -- Web application firewalls / Georges J. Jahchan -- Botnets / Robert M. Slade -- Collaborating information security and privacy to create effective awareness and training / Rebecca Herold -- Security information and event management (SIEM) technology / E. Eugene Schultz -- The insider threat : a view from the outside / Todd Fitzgerald -- Pod slurping / Ben Rothke -- The USB (Universal Security Burden) nightmare : pod slurping and other high storage capacity portable device vulnerabilities / Kenneth F. Belva -- Diary of a security assessment : put that in your pipe and smoke it / Ken M. Shaurette -- NERC compliance : a compliance review / Bonnie Goins Pilewski and Christopher A. Pilewski --Mashup security / Mano Paul -- Format string vulnerabilities / Mano Paul -- Fast scanning worms / Paul A Henry -- Message digests / Ralph Spencer Poore -- Quantum computing : the rise of the machine / Robby Fussell -- Information flow and covert channels / Sean M. Price -- Securing data at rest : from smart phones to tapes defining data at rest / Samuel Chun and Leopold Kahng -- Validating tape backups / Sandy Bacik -- Determining business unit priorities in business continuity management / Kevin Henry -- Continuity program testing, maintenance, training, and awareness / Carl Jackson -- Bluesnarfing / Mano Paul -- Virtualization and digital investigations / Marcus K. Rogers and Sean C. Leshney --Halon fire suppression systems / Chris Hare -- Crime prevention through environmental design / Mollie E. Krehnke -- Data center site selection and facility design consideration / Sandy Bacik
Edition
6th ed.
Extent
1 online resource.
Form of item
online
Isbn
9781420090956
Isbn Type
(electronic bk.)
Media category
computer
Media MARC source
rdamedia
Reproduction note
Electronic reproduction.
Specific material designation
remote
Label
Information security management handbook, Volume 3, Harold F. Tipton, Micki Krause, editors
Link
http://www.byu.eblib.com/EBLWeb/patron/?target=patron&extendedid=P_570476_0
Publication
Note
Description based on print version record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier MARC source
rdacarrier
Content category
text
Content type MARC source
rdacontent
Contents
V. 3. Expanding PKI-based access control capabilities with attribute certificates / Alex Golod -- Five components on identity management systems / Kevin Castellow -- Security weaknesses of system and application interfaces used to process sensitive information / Sean M. Price -- Mobile data security / George G. McBride -- Enhanced security through open standards : a path to a stronger global digital ecosystem / David O'Berry -- Web application firewalls / Georges J. Jahchan -- Botnets / Robert M. Slade -- Collaborating information security and privacy to create effective awareness and training / Rebecca Herold -- Security information and event management (SIEM) technology / E. Eugene Schultz -- The insider threat : a view from the outside / Todd Fitzgerald -- Pod slurping / Ben Rothke -- The USB (Universal Security Burden) nightmare : pod slurping and other high storage capacity portable device vulnerabilities / Kenneth F. Belva -- Diary of a security assessment : put that in your pipe and smoke it / Ken M. Shaurette -- NERC compliance : a compliance review / Bonnie Goins Pilewski and Christopher A. Pilewski --Mashup security / Mano Paul -- Format string vulnerabilities / Mano Paul -- Fast scanning worms / Paul A Henry -- Message digests / Ralph Spencer Poore -- Quantum computing : the rise of the machine / Robby Fussell -- Information flow and covert channels / Sean M. Price -- Securing data at rest : from smart phones to tapes defining data at rest / Samuel Chun and Leopold Kahng -- Validating tape backups / Sandy Bacik -- Determining business unit priorities in business continuity management / Kevin Henry -- Continuity program testing, maintenance, training, and awareness / Carl Jackson -- Bluesnarfing / Mano Paul -- Virtualization and digital investigations / Marcus K. Rogers and Sean C. Leshney --Halon fire suppression systems / Chris Hare -- Crime prevention through environmental design / Mollie E. Krehnke -- Data center site selection and facility design consideration / Sandy Bacik
Edition
6th ed.
Extent
1 online resource.
Form of item
online
Isbn
9781420090956
Isbn Type
(electronic bk.)
Media category
computer
Media MARC source
rdamedia
Reproduction note
Electronic reproduction.
Specific material designation
remote

Library Locations

Processing Feedback ...