Operating Systems
Programming Languages
Microsoft Technologies
Computer Science
Software Engineering
Web Programming
Web Technologies

Contact Us | What's New | Missing Link | Feedback


Book Title : Handbook of Information Security Management
eBook download format(s) : html
ISBN-10 : 0849399475 
ISBN-13 : 978-0-849399-47-3 
Author(s) : Micki, Ed. Krause
Publisher : Auerbach Publications (Jan 1998)
Section : Miscellaneous
Book Review:

Product Description
This guide provides information on ways to design and develop secure information systems, showing how to build safeguards in the system from the start. It describes effective access controls as well as various models and techniques for user verification and automated intrusion detection. The book also covers OSI and ISDN protocols, and using cryptography to secure communications and control EDI transactions.

add to                 Digg!

You may use anyone of the download options

eBook VersionBuy this book from Amazon
Front Cover

Missing Link?, Report It and you may wish to  Buy  this book from amazon

Tell a Friend!

Similar Book titles in Miscellaneous section:
Software Project Management, 2nd Ed.
Information Retrieval
Data Conversion Handbook
Statistical Analysis of Management Data
Formatting Information, a Beginner's Introduction to Typesetting With LaTeX
Handbook of Applied Cryptography
Information Retrieval: A Survey
Information Retrieval, Second Edition
Information Retrieval Interaction
An Introduction to Information Retrieval

Similar Book titles in Other sections:

Section: Finance and Accounting
Essentials of Payroll Management and Accounting

Section: Bio-Chemistry
Complexity in Biological Information Processing
Handbook of Photosensory Receptors
CRC Handbook Chemistry and Physics, 85th Edition

Section: Data Structures and Algorithms
Handbook of Algorithms and Data Structures

Section: Parallel Computing
Handbook of Applied Expert Systems

Section: CS -> Theory
Information Theory, Inference and Learning Algorithms
Algorithmic Information Theory, Third Printing
Discovering Information Systems An Exploratory Approach

Section: DB -> Datawarehousing
Algorithmic Information Theory
Information Modeling: Specification and Implementation
The Geometry of Information Retrieval
Modern Information Retrieval

Section: DB -> DB / 2
Storage Management with DB2 for OS/390
Getting Started on Integrating Your Information

Section: DB -> Oracle
Advanced Oracle PL/SQL Programming with Packages (Nutshell Handbook)

Section: DB -> Others
TEXIS: Text Information Relational Database Server User's Guide
Object-Oriented Database Management Systems Revisited

Section: Photography
Digital Photography Workflow Handbook

Section: Microprocessor
Alpha Architecture Handbook Version 4
8085 Information

Section: Peripherals
Serial Port Programming Information ZIP
SoundBlaster Programming Information v0.90

Section: Internet
Internet Publishing Handbook
Practical UNIX & Internet Security
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Hacker's Handbook
Handbook for bloggers and cyber-dissidents
Show all..

Section: Java Networking
JAVA 2 Network Security

Section: Mathematics
The ePMbook - Project and Programme Management
Abramowitz and Stegun: Handbook of Mathematical Functions

Section: Sales, Marketing & Trading
Software Product Management: Managing Software Development from Idea to Product to Marketing to Sales
Engaged Knowledge Management Engagement With New Realities

Section: Microsoft Certifications
Microsoft Internet Information Server 4 Training

Section: Microsoft .(dot) net
The .NET Developer's Guide to Windows Security
Improving Web Application Security: Threats and Countermeasures

Section: Microsoft Windows Servers
Microsoft Systems Management Server 2.0 Training Kit
Special Edition Using Microsoft Internet Information Server
Designing and Implementing Microsoft Internet Information Server

Section: Windows Development
Windows XP Registry Handbook

Section: Networking
Introduction to Computer, Internet & Network Systems Security
Traffic Management for High-Speed Networks
Wireless Networking Handbook
Network Management Survival Guide
Internetworking Technologies Handbook, Fourth Edition
Show all..

Section: Other Engineering
Structural Engineering Handbook
Forensic Structural Engineering Handbook
Ocean Engineering Handbook
Shock and Vibration Handbook
Handbook of Corrosion Engineering
Show all..

Section: GNU/Linux OS
Security in Open Systems
The Linux Administrator's Security Guide
Get Acquainted with Linux Security and Optimization System
Linux Security for Beginners
Slackware Handbook
Show all..

Section: Mac OS X
Maximum Mac OS X Security

Section: OS Theory
ISO/IEC DIS 9660:1999 Volume and File Structure of CD-ROM for Information Interchange

Section: Unix OS
The Unix-Haters Handbook
FreeBSD Developers Handbook
FreeBSD Handbook (2nd Edition)

Section: Physics
CRC Handbook of Chemistry and Physics, 87th Edition

Section: C++ Language
ANSI/ISO C++ Professional Programmer's Handbook

Section: Scripting
Python Imaging Library Handbook (2003 Edition)

Section: Smalltalk
Smalltalk/V Mac Tutorial and Programming Handbook

Section: Redbooks Draft
WebSphere RFID Handbook: A Solution Guide
Deployment Guide Series: IBM Change Configuration Management Database Configuration Discovery and Tracking Server v1.1
Identity Management Advanced Customization for IBM Tivoli Identity Manager
LPAR Simplification Handbook
Deployment Guide Series: IBM Change and Configuration Management Database Configuration Discovery and Tracking Server v1.1
Show all..

Section: Redbooks
Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement
Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security
WebSphere Process Integration V6: Business Process Management Modeling through Monitoring
IBM eServer pSeries Systems Handbook 2003 Edition
Enterprise Security Architecture Using IBM Tivoli Security Solutions
Show all..

Section: IBM Technotes
Deploying Tivoli Enterprise Management Agents in IBM Tivoli Monitoring V6.1

Section: Redpapers
WebSphere Application Server on z/OS and Security Integration
Security with IBM Tivoli Access Manager V6 and IBM WebSphere Application Server V6 on IBM z/OS
J2C Security on z/OS
Java Message Service (JMS) Security on z/OS
z/OS UNIX Security Fundamentals
Show all..

Section: Redpapers Draft
Improving your WebApplication Software Development Life Cycle's Security Posture with IBM Rational AppScan
Best Practices for SOA Management
IBM OMEGAMON z/OS Management Console 1.1.1
Architecting a Highly Efficient Image Management System with Tivoli Provisioning Manager for OS Deployment
WebSphere Application Server V6.1: Workload Management Problem Determination
Show all..

Section: Software Engineering
Project and Programme Management
Project Management Experiment
Manager's Handbook for Software Development
Managing Information Technology Projects
The Project Management Question and Answer Book
Show all..

Section: Telecommunication
Practical Radio Frequency Handbook
Teletraffic Engineering Handbook

Section: Web Technology
Information Architecture for the World Wide Web

Similar Books from Amazon :

Tell a Friend!

©2008 - Home - Privacy Policy - Program Policy, Terms and Conditions