Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
18
result(s) for
"Computer security Management Handbooks, manuals, etc."
Sort by:
Information Security Management Handbook, Volume 6
by
Krause Nozaki, Micki
,
Tipton, Harold F
in
Computer security
,
Computer security -- Management -- Handbooks, manuals, etc
,
Data protection
2012,2011
This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required by IT security professionals. It covers the CISSP Common Body of Knowledge (CBK) that forms the standard on which all IT security programs and certifications are based. Topics covered include access control, physical (environmental) security, cryptography, application security, and operations security. This new edition features the latest developments in information security and the (ISC)2 CISSP CBK, including advanced persistent threats, new HIPAA requirements, social networks, virtualization, and SOA.
Information security management handbook
2016,2012,2011
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbookis the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5reflects the latest issues in information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.
Information Security Management Handbook, Volume 5
by
Krause Nozaki, Micki
,
Tipton, Harold F
in
Computer security
,
Handbooks, manuals, etc
,
Management
2012,2011
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Compiling the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest changes to information security and the CISSP Common Body of Knowledge (CBK). This edition updates the benchmark Volume 1 with a wealth of new information.
Syngress IT Security Project Management Handbook
2006
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.* The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
Computer Concepts and Management Information Systems
by
Gupta, C. P
,
Goyal, K. K
in
Automation
,
COM058000 COMPUTERS / Desktop Applications / Word Processing
,
Computer networks
2020
Designed to provide the reader with the fundamentals of computers and MIS in an easy to understand, self-teaching format, this book includes discussion of information systems, ERP, security, business ethics, and cybercrime. --
Disaster Recovery Handbook
by
Webber, Lawrence
,
Wallace, Michael
in
Business planning
,
Business planning -- Handbooks, manuals, etc
,
Computer security
2004
Intro -- CONTENTS -- FOREWORD -- INTRODUCTION -- PART ONE THE PLAN -- GETTING STARTED Overview of the Project -- RISK ASSESSMENT Understanding What Can Go Wrong -- BUILD AN INTERIM PLAN DonÌt Just Sit There, Do Something -- EMERGENCY OPERATIONS CENTER Take Control of the Situation -- WRITING THE PLAN Getting It Down on Paper -- TESTING Making Sure It Works -- PART TWO THE ASSETS -- ELECTRICAL SERVICE Keeping the Juice Flowing -- TELECOMMUNICATIONS Your Connection to the World -- VITAL RECORDS RECOVERY Covering Your Assets -- DATA Your Most Irreplaceable Asset -- NETWORKS The Ties That Bind -- END-USER PCs The Weakest Link -- CUSTOMERS Other People to Worry About -- SUPPLIERS Collateral Damage -- PART THREE PREVENTING DISASTER -- FIRE Burning Down the House -- HUMAN RESOURCES Your Most Valuable Asset -- BACKUPS The Key to a Speedy Recovery -- VIRUS CONTAINMENT High Tech Pest Control -- HEALTH AND SAFETY Keeping Everyone Healthy -- TERRORISM The Wrath of Man -- APPENDIX - HELPFUL WEB SITES FOR DISASTER RECOVERY -- INDEX -- ABOUT THE AUTHORS.