You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP) Common Body of Knowledge (CBK) and NIST SP 800-37, the Official
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.
Crisis management planning refers to the methodology used by executives to respond to and manage a crisis and is an integral part of a business resumption plan. Crisis Management Planning and Execution explores in detail the concepts of crisis management planning, which involves a number of crises other than physical disaster. Defining th
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation, violating a consumer's privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to da
Edited by experts, this book brings together the collective experience of trail blazers. A glance through the contents demonstrates the breadth and depth of coverage, not only in topics included but also in expertise provided by the chapter authors. They are the pioneers, who, while initially making it up as they went along, now provide the next generation a guide to success. This is not a how-to book or a collection of technical data, it does not cover products or technology or provide a recapitulation of the common body of knowledge. Capturing years of hard knocks, success stories, and yes, failures, it delineates information needed and includes from-the-trenches advice on how to have a successful career in this field.
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.
Although we live in a world where we are surrounded in an ever-deepening fog of data, few understand how the data are created, where data are stored, or how to retrieve or destroy data. Accessible to readers at all levels of technical understanding, Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Sto
The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and t...
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks. It supplies an overview of relevant U.S. Federal cyber incident response policies and outlines an organizational framework for assessing risk.