Information Security Management Handbook, 2012 CD-ROM

Micki Krause

October 15, 2012 by Auerbach Publications
Reference - 480 Pages
ISBN 9781439892091 - CAT# K14130

This product is not available
FREE Standard Shipping!


  • Provides fundamental knowledge, skills, techniques, and tools required by all IT security professionals
  • Updates the sixth edition with new developments in information security and the (ISC) CISSP® CBK®
  • Covers advanced persistent threats, new HIPAA requirements, social networks, virtualization, and SOA
  • Discusses access control, physical security, cryptography, application security, and operations security


Updated annually, the Information Security Management Handbook is the most comprehensive and up-to-date reference available on information security and risk management. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

Reporting on the latest developments in information security, this volume features 31 new entries on Social Networking, Secure Software Lifecycle, Insider Threat, Application Whitelisting, Server Virtualization, Security Requirements Analysis, CERT Resilience Management Model, Continuous Monitoring, Service-Oriented Architecture, Cloud Security, Managing Advanced Persistent Threats, Virtualization Forensics, Protected Health Information under HIPAA and HITECH, and more. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications.

This 2012 CD-ROM Edition contains the complete contents of every annual edition of the handbook since 1997, including 2012. It is an authoritative resource that is linked, searchable by keyword, and organized under the CISSP® CBK® domains. In addition to the complete contents of the set, the CD-ROM includes an extra volume’s worth of information—including chapters from other security and networking books that have never appeared in the print edition of the Information Security Management Handbook.