Information security management handbook /
"The Information Security Management Handbook maps to the ten domains of the Common Body of Knowledge tested on the certification examination: access control issues and methodology; telecommunications and network security; security management practices; applications and systems development secu...
Salvato in:
| Altri autori: | , |
|---|---|
| Natura: | Libro |
| Lingua: | English |
| Pubblicazione: |
Boca Raton, FL :
Auerbach,
1999-2003.
|
| Edizione: | 4th ed. |
| Soggetti: |
| LEADER | 02264cam a2200409 a 4500 | ||
|---|---|---|---|
| 001 | c000404778 | ||
| 003 | CARM | ||
| 005 | 20190507150710.0 | ||
| 008 | 190507m19992003flua afb 001 0 eng d | ||
| 010 | |a 00002347 | ||
| 019 | 1 | |a 69842280 |5 LACONCORD2021 | |
| 020 | |a 0849311276 (v.3) | ||
| 020 | |a 0849398290 (v.1) | ||
| 020 | |a 0849308003 (v.2) | ||
| 020 | |a 0849315182 (v.4) | ||
| 035 | |a (OCoLC)1222036113 |5 LACONCORD2021 | ||
| 040 | |a VVUT |b eng |c VVUT | ||
| 082 | 0 | 0 | |a 658.478 |2 21 |
| 245 | 0 | 0 | |a Information security management handbook / |c Micki Krause, Harold F. Tipton, editors. |
| 250 | |a 4th ed. | ||
| 260 | |a Boca Raton, FL : |b Auerbach, |c 1999-2003. | ||
| 300 | |a 4 v. : |b ill. ; |c 24 cm. | ||
| 500 | |a Rev. ed. of: Handbook of information security management 1999. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 520 | 1 | |a "The Information Security Management Handbook maps to the ten domains of the Common Body of Knowledge tested on the certification examination: access control issues and methodology; telecommunications and network security; security management practices; applications and systems development security; cryptography; security architecture and models; operations security; business continuity planning and disaster recovery planning; law, investigations, and ethics; and physical security." "The Information Security Management Handbook is a 'must have' book, whether you're preparing for the CISSP exam or need a comprehensive, up-to-date reference, or both."--BOOK JACKET. | |
| 650 | 0 | |a Data protection |x Handbooks, manuals, etc. | |
| 650 | 0 | |a Computer security |x Management |x Handbooks, manuals, etc. | |
| 650 | 0 | |a Data protection |v Handbooks, manuals, etc. | |
| 700 | 1 | |a Tipton, Harold F. | |
| 700 | 1 | |a Krause, Micki. | |
| 740 | 0 | 2 | |a Handbook of information security management 1999. |
| 852 | 8 | |b CARM |i C13776 |p 0655427 |j V. 3 |f BK | |
| 852 | 8 | |b SCAN |h A3:AP05E0 |i C13776 |p 0655427 |f BK | |
| 852 | 8 | |b SCAN |h A3:AP05E0 |i C13776 |p 0655427 |f BK | |
| 999 | f | f | |i 6526ebd5-0024-5d6f-b5bc-33a997ef172e |s 03fc78c3-aaba-5d8a-ae42-58556649ab62 |
| 952 | f | f | |p Can circulate |a CAVAL |b CAVAL |c CAVAL |d CARM 1 Store |e C13776 |h Other scheme |i book |j V. 3 |m 0655427 |
| 952 | f | f | |a CAVAL |b CAVAL |c CAVAL |d Unmapped Location |e C13776 |f A3:AP05E0 |h Other scheme |