Information Security Management Handbook, 6/e, Volume 3 (Hardcover)
暫譯: 資訊安全管理手冊,第6版,第三卷(精裝本)
Harold F. Tipton, Micki Krause
- 出版商: Auerbach Publication
- 出版日期: 2009-06-01
- 定價: $3,320
- 售價: 8.5 折 $2,822
- 語言: 英文
- 頁數: 392
- 裝訂: Hardcover
- ISBN: 1420090925
- ISBN-13: 9781420090925
-
相關分類:
資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
8051 C 語言實作寶典$650$585 -
Computer Security: Principles and Practice (Paperback)$1,120$1,098 -
Assembly Language for Intel-Based Computers, 5/e (IE) (美國版ISBN:0132383101)$1,000$980 -
Microsoft LINQ 最佳實務講座$550$467 -
深入淺出 C# (Head First C#)$980$774 -
OCA Oracle Database 11g: SQL Fundamentals I Exam Guide (Exam 1Z0-051)$2,210$2,099 -
Java 編程語言 (The Java Programming Language, 4/e)$820$647 -
大話設計模式$620$527 -
Introduction to Algorithms, 3/e (IE-Paperback)$1,590$1,558 -
Java 認證 SCJP 6.0/5.0 猛虎出閘$680$537 -
精通 Windows API 函數、介面、程式設計實例$640$506 -
ActionScript 多人互動遊戲與虛擬世界製作 (ActionScript for Multiplayer Games and Virtual Worlds)$520$442 -
3ds Max 2009 完全學習手冊$680$578 -
Google Android SDK 開發範例大全$750$637 -
資訊科技專案管理 (Schwalbe: Information Technology Project Management, 5/e)$600$588 -
AutoCAD 2010 特訓教材-基礎篇$630$497 -
.NET 通訊介面開發與應用$580$458 -
Linux Shell 程式設計實務$650$552 -
Google Android 2 程式設計與應用$520$410 -
Silverlight 3.0 全面精通手冊─使用 VC#$650$513 -
Mac OS X 10.6 Snow Leopard 使用手冊$580$458 -
鳥哥的 Linux 私房菜-基礎學習篇, 3/e$820$647 -
iPhone SDK 應用程式開發實務$550$467 -
Google!Android 2 手機應用程式設計入門, 3/e$530$419 -
Google Android SDK 開發範例大全 2$890$756
資訊安全書展|中文簡體2書75折 英文2書85折 詳見活動內容 »
-
VIP 95折
Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness (Paperback)$2,550$2,422 -
VIP 95折
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility$1,900$1,805 -
85折
$1,785Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide: In-Depth Guidance and Practice -
VIP 95折
Data-Driven Cybersecurity: Reducing Risk with Proven Metrics$2,160$2,052 -
VIP 95折
Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision (Paperback)$1,690$1,605 -
85折
$1,573Microsoft Security Copilot: Master strategies for AI-driven cyber defense -
VIP 90折
Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection (Paperback)$2,565$2,430 -
VIP 95折
Privileged Access Management: Strategies for Zero Trust in the Enterprise$1,860$1,767 -
VIP 90折
Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback)$1,995$1,890 -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
電腦安全:原理與實踐(原書第5版)*此書為英文原文書*$774$735 -
CISSP Study Guide 2025-2026: All in One CISSP Exam Prep for the ICS2 Certified Information Systems Security Professional Certification. With Exam Review Material & 774 CISSP Practice Test Questions (Paperback)$1,800$1,764 -
VIP 95折
IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)$2,080$1,976 -
85折
$1,530Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies -
VIP 95折
Cryptography (Paperback)$850$807 -
VIP 95折
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption$2,100$1,995 -
VIP 95折
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc (美國原版)$3,300$3,135 -
85折
$3,383A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice -
85折
$1,785Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles (Paperback) -
VIP 95折
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum$1,840$1,748 -
VIP 90折
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp$2,517$2,385 -
85折
$2,678Developing Cybersecurity Programs and Policies in an Ai-Driven World -
VIP 95折
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection (Paperback)$1,990$1,890 -
VIP 95折
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Hardcover) 2/e$2,800$2,660 -
85折
$1,530Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
商品描述
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.
Captures the crucial elements of the CBK
Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.
Also available on CD-ROM
Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow’s hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.
商品描述(中文翻譯)
每年,隨著不同國家和地區的新技術和新法律的出現,所有IT安全專業人員所需的基本知識、技能、技術和工具都會發生變化。隨著技術領域變化的速度越來越快,《資訊安全管理手冊》(Information Security Management Handbook)每年更新,已成為所有IT安全計劃和認證的標準。它反映了全球IT安全專業人員需要了解的共同知識體系(Common Body of Knowledge, CBK)的新更新。
**捕捉CBK的關鍵要素**
本書探討CBK的十個領域,包括存取控制、電信和網路安全、資訊安全和風險管理、應用安全以及密碼學。此外,專家貢獻者還討論了安全架構和設計、運營安全、業務持續計劃和災難恢復計劃。本書還涵蓋法律法規、合規性、調查和物理安全。在這本處理資訊安全管理和技術面向的論文集裡,貢獻者探討了各種主題,如隨處計算、虛擬化、podslurping、量子計算、混合應用、藍牙竊取、行動裝置盜竊、社交計算、投票機不安全性和格式字串漏洞。
**也可在CD-ROM上獲得**
保護資訊仍然是所有IT專業人員的重要關注點。隨著新風險威脅我們系統的安全,負責保護這些資訊的人必須不斷更新他們的知識裝甲,以防範明天的駭客和軟體漏洞。這本全面的《手冊》,也以可完全搜尋的CD-ROM格式提供,讓IT專業人員隨時掌握安全領域的新發展,並強化永恆的概念,為他們提供最佳的資訊、指導和建議。
