You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i
This is book 2. The Doughty Women: Susan Susan Doughty is a Government Girl residing in Washington, D.C. in May of 1942. Sharing an apartment with two friends at the height of the war effort, she treks off to work every day at the Federal Bureau of Investigation in what has been, until now, a humdrum job. While she worries about her sister, famous war correspondent Kit Doughty, currently stationed in London and recently married, Susan finds herself yearning for her own adventures. Because, by comparison, her existence seems very tame, very safe. Humdrum. Alas for Susan. A wish once made cannot be easily unmade. Her promotion at work, from the fingerprinting division to one more secretive inv...
Updated annually, this is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledgerequired of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 CISSP Common Body of Knowledge (CBK), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook
It has become increasingly difficult to hire and keep warm bodies, not to mention competent IT personnel. With this in mind, outsourcing ceases to be an option and becomes a necessity. Web hosting, application service providers, and integrating legacy and ERP systems are just three examples of when outsourcing is the rule rather than the exception.
The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integra
Organizations that rely on computing technology for survival understand the critical importance of managing projects that meet strategic goals and objectives. The diversity of business globalization and electronic commerce combined with the unceasing pace of technical change continues to challenge efforts for more proficient project management tech
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now