+7(495) 980-12-10
  10:00-18:00 пн-пт
    shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
  Зарубежные издательства Российские издательства  
   Авторы    Каталог книг    Издательства    Новинки    Учебная литература    Специальные предложения  Бестселлеры
 
 
Книги    
Logobook
Книги зарубежных издательств на иностранных языках
Logobook
Книги российских издательств
Logobook
Представительство в Казахстане
 
Вход в систему   
 
Регистрация  Забыли?
 
Информация   
Контакты/Адрес/Проезд
Корзина
Ваши заказы
Доставка и Оплата
Заказ по телефону/email
Помощь
Есть вопрос?
О компании
Политика конфиденциальности
LgBook.ru
FkBook.ru
 
Online Каталоги   
Cambridge University Press
Каталог учебной литературы
по английскому языку >>>

Oxford University Press
Каталог учебной литературы
по английскому языку >>>



Каталог учебной литературы
по английскому языку >>>

Pearson ELT

Читайте отзывы покупателей и оценивайте качество магазина на Яндекс.Маркете

Information security management handbook, Tipton, Harold F.

Information security management handbook

Автор: Tipton, Harold F.
Название:  Information security management handbook
Издательство: Taylor&Francis
Классификация:
Безопасность сети

ISBN: 1439819025
ISBN-13(EAN): 9781439819029
ISBN: 1-439-81902-5
ISBN-13(EAN): 978-1-439-81902-9
Обложка/Формат: Hardback
Страницы: 529
Вес: 1.118 кг.
Дата издания: 30.06.2010
Язык: ENG
Издание: 6 rev ed
Иллюстрации: 126 black & white illustrations, 8 black & white tables
Размер: 25.40 x 17.53 x 3.30 cm
Читательская аудитория: Postgraduate, research & scholarly
Рейтинг:
Поставляется из: Англии
Описание: Updated annually, this handbook has become the standard on which all IT security programs and certifications are based. It provides a compilation of the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. This edition reflects the changes to the Common Body of Knowledge CBK in response to new technologies and new laws in different countries and regions. It presents new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. Additional chapters cover risk management, business continuity planning, disaster recovery planning, and

 Варианты приобретения 
  Кол-во Наличие на складе Цена р. Купить / Отложить
1 Отсутствует. Возможна поставка под заказ.
При оформлении заказа до: 18 сен 2017
Ориентировочная дата поставки: 6 окт 2017
При условии наличия книги у поставщика.
8976.00
 о цене
Добавить в корзину
Add to Wish list

Отзывы покупателей.
Добавить отзыв.
Information Security Risk Assessment Toolkit,

Автор: Mark Talabis
Название: Information Security Risk Assessment Toolkit,
ISBN: 1597497355 ISBN-13(EAN): 9781597497350
Издательство: Elsevier Science
Цена: 2999 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Купить

Information Security Management Handbook, 2009 CD-ROM Edition

Название: Information Security Management Handbook, 2009 CD-ROM Edition
ISBN: 1420090984 ISBN-13(EAN): 9781420090987
Издательство: Taylor&Francis
Цена: 8536 р.
Наличие на складе: Поставка под заказ.
Описание: A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this work forms the basis on which all IT security programs and certifications are created. Considered the gold-standard reference of Information Security, the 2009 CD-Rom edition includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this CD is revised annually, keeping IT professionals updated and current in their field and on the job.

A print version is also available.

Купить

Information Security Management Handbook, Sixth Edition, Volume 3

Название: Information Security Management Handbook, Sixth Edition, Volume 3
ISBN: 1420090925 ISBN-13(EAN): 9781420090925
Издательство: Taylor&Francis
Цена: 5367 р.
Наличие на складе: Поставка под заказ.
Описание: Includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. This book includes information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance.
Купить

Information Security Management

Автор: Raggad
Название: Information Security Management
ISBN: 1420078542 ISBN-13(EAN): 9781420078541
Издательство: Taylor&Francis
Цена: 5455 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps for conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.
Купить

Information Security Fundamentals, Second Edition

Автор: Peltier
Название: Information Security Fundamentals, Second Edition
ISBN: 1439810621 ISBN-13(EAN): 9781439810620
Издательство: Taylor&Francis
Цена: 4311 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. Reorganizing its contents around ISO 27002, this updated edition presents ten new chapters; adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks; expands its coverage of compliance and governance issues; and includes new information on mobile security issues.
Купить

Information Security Policies and Procedures

Автор: Peltier
Название: Information Security Policies and Procedures
ISBN: 0849319587 ISBN-13(EAN): 9780849319587
Издательство: Taylor&Francis
Цена: 18427 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: This book illustrates how policies and procedures support the efficient running of an organization. It points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements. The authors emphasize how information security must be integrated into all business processes. The book examines Tier 1, Tier 2, and Tier 3 policies.
Купить

Security Information and Event Management (Siem) Implementation

Автор: Miller David, Payton Zachary, Harper Allen
Название: Security Information and Event Management (Siem) Implementation
ISBN: 0071701095 ISBN-13(EAN): 9780071701099
Издательство: McGraw-Hill
Цена: 4223 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations

"Security Information and Event Management (SIEM) Implementation" shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems.

This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions.

"Security Information and Event Management (SIEM) Implementation" Includes a Smartbook--a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions

All-inclusive coverage:
Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; Open Systems SIEM Implementation; Open Systems SIEM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques

Купить

Information Security Policy Development for Compliance

Автор: Williams
Название: Information Security Policy Development for Compliance
ISBN: 1466580585 ISBN-13(EAN): 9781466580589
Издательство: Taylor&Francis
Цена: 3783 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: Compliance standards, of which there are many, can and should be used as a guide to write comprehensive and effective security policies. Many standards cover much of the same topics, but they each state the requirements in slightly different ways. This book provides security managers with a simplified way to address the regulatory requirements of an organization by writing policy statements that specifically address these requirements. The book enables them to more efficiently write policies that meet the major regulatory requirements.
Купить

Information Security Policies, Procedures, and Standards

Автор: Landoll
Название: Information Security Policies, Procedures, and Standards
ISBN: 1482245892 ISBN-13(EAN): 9781482245899
Издательство: Taylor&Francis
Цена: 6798 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. Readers will develop the understanding needed to write effective policies and procedures clearly and concisely.
Купить

The CISM Prep Guide: Mastering the Five Domains of Information Security Management

Автор: Ronald L. Krutz
Название: The CISM Prep Guide: Mastering the Five Domains of Information Security Management
ISBN: 0471455989 ISBN-13(EAN): 9780471455981
Издательство: Wiley
Цена: 3692 р.
Наличие на складе: Поставка под заказ.
Описание: Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003 CISM is business-oriented and intended for the individual who must manage, design, oversee, and assess an enterprise's information security Essential reading for those who are cramming for this new test and need an authoritative study guide Many out-of-work IT professionals are seeking security management certification as a vehicle to re-employment CD-ROM includes a Boson-powered test engine with all the questions and answers from the book
Купить

An Information Security Handbook

Автор: Hunter John M.
Название: An Information Security Handbook
ISBN: 1852331801 ISBN-13(EAN): 9781852331801
Издательство: Springer
Цена: 5001 р.
Наличие на складе: Есть у поставщика.Поставка под заказ.
Описание: Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Купить

Computer and Information Security Handbook

Автор: Vacca, John R.
Название: Computer and Information Security Handbook
ISBN: 0080921949 ISBN-13(EAN): 9780080921945
Издательство: Elsevier Science
Цена: 8316 р.
Наличие на складе: Поставка под заказ.
Описание: This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats.<br><br>It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures.<br><br>In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems.<br><br>From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients.<br><br>Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.<br><br>A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. <br><br>This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. <br><br> <br><br>KEY FEATURES<br><br>* Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. <br><br>* This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.<br><br>* Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Купить


 
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
Visa, Master Card, Diners, AMEX, JCB, Web Money, Yandex Money Сбербанк онлайн