|Listed in category:
Have one to sell?

Information Security Management Handbook, 4th Edition

Condition:
Like New
Like new. 4th edition.
Price:
US $3.99
ApproximatelyEUR 3.69
Postage:
US $5.99 (approx EUR 5.54) Economy P&P. See detailsfor postage
Located in: Brentwood, Tennessee, United States
Delivery:
Estimated between Fri, 14 Jun and Thu, 20 Jun to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the delivery service selected, the seller's delivery history and other factors. Delivery times may vary, especially during peak periods.
Payments:
    

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as private seller, so consumer rights stemming from EU consumer protection law do not apply. eBay Money Back Guarantee still applies to most purchases.
Seller assumes all responsibility for this listing.
eBay item number:224286003364
Last updated on 27 Jun, 2022 15:12:59 BSTView all revisionsView all revisions

Item specifics

Condition
Like New
A book that has been read, but looks new. The book cover has no visible wear, and the dust jacket (if applicable) is included for hard covers. No missing or damaged pages, no creases or tears, no underlining or highlighting of text, and no writing in the margins. May have no identifying marks on the inside cover. No wear and tear. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller notes
“Like new. 4th edition.”
Country/Region of Manufacture
United Kingdom
Topic
Computer/Network Security, Management
Country/Region
United Kingdom
Subject
Security / General, Industrial Health & Safety, Commerce, Information Management
Product Type
Textbook
Educational Level
Professional
Special Attributes
Dust Jacket
ISBN
9780849398292
Subject Area
Computers, Technology & Engineering, Business & Economics
Publication Name
Information Security Management
Item Length
0.9 in
Publisher
Auerbach Publishers, Incorporated
Publication Year
1999
Type
Textbook
Format
Hardcover
Language
English
Item Height
1.7 in
Author
Harold F. Tipton
Item Width
0.6 in
Item Weight
40.4 Oz
Number of Pages
711 Pages

About this product

Product Information

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for use by practitioners to conduct the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Preparing for the examination is a major effort because it requires a thorough understanding of the topics contained in the Common Body of Knowledge (CBK) for the field as specified in the Generally Accepted Systems Security Principles (GASSP). The handbook is one of the most important references used by candidates preparing for the exam. The Information Security Management Handbook maps the ten domains of the Common Body of Knowledge tested on the certification examination: access control issues and methodology, telecommunications and network security, security management practices, applications and systems development security, cryptography, security architecture and models, operations security, business continuity planning and disaster recovery planning, law, investigations, and ethics, and physical security. The Information Security Management Handbook is a "must have" book, whether you're preparing for the CISSP exam or need a comprehensive, up-to-date reference, or both.

Product Identifiers

Publisher
Auerbach Publishers, Incorporated
ISBN-10
0849398290
ISBN-13
9780849398292
eBay Product ID (ePID)
1633927

Product Key Features

Author
Harold F. Tipton
Publication Name
Information Security Management
Format
Hardcover
Language
English
Subject
Security / General, Industrial Health & Safety, Commerce, Information Management
Publication Year
1999
Type
Textbook
Subject Area
Computers, Technology & Engineering, Business & Economics
Number of Pages
711 Pages

Dimensions

Item Length
0.9 in
Item Height
1.7 in
Item Width
0.6 in
Item Weight
40.4 Oz

Additional Product Features

Edition Number
4
LCCN
99-042823
Lc Classification Number
Qa76.9.A25h36 1999A
Volume Number
Vol. 1
Edition Description
Handbook (Instructor's) ,New Edition
Table of Content
DOMAIN 1: ACCESS CONTROL SYSTEMS & METHODOLOGY CHAPTER 1.1 ACCESS CONTROL ISSUES Biometric Identification Single Signon DOMAIN 2: TELECOMMUNICATIONS & NETWORK SECURITY CHAPTER 2.1 NETWORK SECURITY Secured Connections to External Networks CHAPTER 2.2 INTERNET, INTRANET. EXTRANET SECURITY "Internet Firewalls" Internet Security Extranet Access Control Issues Firewall Management Network Layer Security (e.g., SKIP) Transport Layer Security Application Layer Security Protocols for Networks Security of Communication Protocols & Services DOMAIN 3: SECURITY MANAGEMENT PRACTICES CHAPTER 3.1 SECURITY AWARENESS Security Awareness Program CHAPTER 3.2 ORGANIZATION ARCHITECTURE Enterprise Security Architecture An Introduction to IPSec CHAPTER 3.3 RISK MANAGEMENT Risk Analysis and Assessment Protecting High Tech Business Secrets Information Security Management in the Healthcare Industry DOMAIN 4: APPLICATIONS & SYSTEMS DEVELOPMENT SECURITY CHAPTER 4.1 APPLICATION SECURITY "Security Models for Object Oriented Databases" 999 DOMAIN 5: CRYPTOGRAPHY CHAPTER 5.1 CRYPTO TECHNOLOGY & IMPLEMENTATIONS "Fundamentals of Cryptography & Encryption" "Principles & Applications of Cryptographic Key Management" "Implementing Kerberos in Distributed Systems" "PKI" DOMAIN 6: SECURITY ARCHITECTURE & MODELS CHAPTER 6.1 MICROCOMPUTER & LAN SECURITY "Microcomputer & LAN Security" DOMAIN 7: OPERATIONS SECURITY CHAPTER 7.1 THREATS "Types of Network Attacks" "A Look at Java Security" DOMAIN 8: BUSINESS CONTINUITY PLANNING & DISASTER RECOVERY PLANNING CHAPTER 8.1 BUSINESS CONTINUITY PLANNING "Process Improvement BCP" CHAPTER 8.2 DISASTER RECOVERY PLANNING "Restoration Component of BCP" DOMAIN 9: LAW, INVESTIGATIONS & ETHICS CHAPTER 9.1 INVESTIGATION Computer Crime Investigation CHAPTER 9.2 INFORMATION ETHICS Ethics and the Internet CHAPTER 9.3 INFORMATION LAW Jurisdictional Issues in Global Transmissions DOMAIN 10: PHYSICAL SECURITY CHAPTER 10.1 THREATS & FACILITY REQUIREMENTS Intrusion Detection: How to Utilize a Still Immature Technology
Copyright Date
2000
Target Audience
Scholarly & Professional
Illustrated
Yes

Item description from the seller

scomer72

scomer72

100% positive Feedback
357 items sold
Registered as a private seller
Thereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.

Seller Feedback (237)

2***e (1287)- Feedback left by buyer.
Past 6 months
Verified purchase
Fast shipping. Good Seller
m***g (99)- Feedback left by buyer.
Past 6 months
Verified purchase
Thanks Gordon
Reply from: scomer72- Feedback replied to by seller scomer72.- Feedback replied to by seller scomer72.
Thank you for the positive feedback.
i***9 (168)- Feedback left by buyer.
Past year
Verified purchase
all good.
Reply from: scomer72- Feedback replied to by seller scomer72.- Feedback replied to by seller scomer72.
Thank you for the positive feedback!