Logo

Handbook of Information Security Management

Large book cover: Handbook of Information Security Management

Handbook of Information Security Management
by

Publisher: Auerbach Publications
ISBN/ASIN: 0849399475
ISBN-13: 9780849399473
Number of pages: 752

Description:
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. With this book you will learn how to take the offensive in the battle against information security threats by seeing how the experts do it.

Download or read it online for free here:
Read online
(online preview)

Similar books

Book cover: Security and Privacy for Microsoft Office 2010 UsersSecurity and Privacy for Microsoft Office 2010 Users
by - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(9594 views)
Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18819 views)
Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(12889 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9871 views)