0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (6)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Information Security Management Handbook, Volume 6 (Paperback, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 6 (Paperback, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R1,424 Discovery Miles 14 240 Ships in 9 - 15 working days

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA. Its comprehensive coverage touches on all the key areas IT security professionals need to know, including: Access Control: Technologies and administration including the requirements of current laws Telecommunications and Network Security: Addressing the Internet, intranet, and extranet Information Security and Risk Management: Organizational culture, preparing for a security audit, and the risks of social media Application Security: Ever-present malware threats and building security into the development process Security Architecture and Design: Principles of design including zones of trust Cryptography: Elliptic curve cryptosystems, format-preserving encryption Operations Security: Event analysis Business Continuity and Disaster Recovery Planning: Business continuity in the cloud Legal, Regulations, Compliance, and Investigation: Persistent threats and incident response in the virtual realm Physical Security: Essential aspects of physical security The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Information Security Management Handbook, Volume 6 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 6 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R4,333 Discovery Miles 43 330 Ships in 12 - 17 working days

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA. Its comprehensive coverage touches on all the key areas IT security professionals need to know, including: Access Control: Technologies and administration including the requirements of current laws Telecommunications and Network Security: Addressing the Internet, intranet, and extranet Information Security and Risk Management: Organizational culture, preparing for a security audit, and the risks of social media Application Security: Ever-present malware threats and building security into the development process Security Architecture and Design: Principles of design including zones of trust Cryptography: Elliptic curve cryptosystems, format-preserving encryption Operations Security: Event analysis Business Continuity and Disaster Recovery Planning: Business continuity in the cloud Legal, Regulations, Compliance, and Investigation: Persistent threats and incident response in the virtual realm Physical Security: Essential aspects of physical security The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Information Security Management Handbook, Volume 5 (Hardcover, 6th edition): Micki Krause Nozaki, Harold F. Tipton Information Security Management Handbook, Volume 5 (Hardcover, 6th edition)
Micki Krause Nozaki, Harold F. Tipton
R4,341 Discovery Miles 43 410 Ships in 12 - 17 working days

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.

Information Security Management Handbook, Volume 2 (Paperback, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 2 (Paperback, 6th edition)
Harold F. Tipton, Micki Krause
R1,832 Discovery Miles 18 320 Ships in 12 - 17 working days

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.

Information Security Management Handbook, Volume 3 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 3 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R4,307 Discovery Miles 43 070 Ships in 12 - 17 working days

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.

Captures the crucial elements of the CBK

Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.

Also available on CD-ROM

Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow's hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.

CISO Leadership - Essential Principles for Success (Hardcover): Todd Fitzgerald, Micki Krause CISO Leadership - Essential Principles for Success (Hardcover)
Todd Fitzgerald, Micki Krause
R2,512 Discovery Miles 25 120 Ships in 12 - 17 working days

Caught in the crosshairs of ?Leadership? and ?Information Technology?, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication, risk assessment, and corporate business savvy, needed by CISOs. Yet a lack in any of these areas can short circuit a career in information security.

CISO Leadership: Essential Principles for Success captures years of hard knocks, success stories, and yes, failures. This is not a how-to book or a collection of technical data. It does not cover products or technology or provide a recapitulation of the common body of knowledge. The book delineates information needed by security leaders and includes from-the-trenches advice on how to have a successful career in the field.

With a stellar panel of contributors including William H. Murray, Harry Demaio, James Christiansen, Randy Sanovic, Mike Corby, Howard Schmidt, and other thought leaders, the book brings together the collective experience of trail blazers. The authors have learned through experience?been there, done that, have the t-shirt?and yes, the scars. A glance through the contents demonstrates the breadth and depth of coverage, not only in topics included but also in expertise provided by the chapter authors. They are the pioneers, who, while initially making it up as they went along, now provide the next generation of information security professionals with a guide to success.

Information Security Management Handbook, Volume 4 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 4 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R4,338 Discovery Miles 43 380 Ships in 12 - 17 working days

Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.

Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP(r) Common Body of Knowledge (CBK(r)). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.

As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.

Information Security Management Handbook, Volume 2 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 2 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R3,729 Discovery Miles 37 290 Ships in 12 - 17 working days

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.

Information Security Management Handbook (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R7,766 Discovery Miles 77 660 Ships in 12 - 17 working days

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.

Information Security Management Handbook, Volume 4 (Paperback, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 4 (Paperback, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R1,838 Discovery Miles 18 380 Ships in 12 - 17 working days

Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography. As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cattle Of The Ages - Stories And…
Cyril Ramaphosa Hardcover  (4)
R850 R663 Discovery Miles 6 630
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Dromex 3-Ply Medical Mask (Box of 50)
 (17)
R1,099 R399 Discovery Miles 3 990
Shield Brake and Parts Cleaner (500ml)
R61 Discovery Miles 610
First Dutch Brands Wire Wall Basket With…
R100 Discovery Miles 1 000
High Waist Leggings (Black)
R169 Discovery Miles 1 690
Guilty And Proud - An MK Soldier's…
Marion Sparg Paperback R330 R240 Discovery Miles 2 400
Sellotac Reusable Sticky Tack (100g)
 (1)
R15 Discovery Miles 150
Professor Snape Wizard Wand - In…
 (8)
R832 Discovery Miles 8 320

 

Partners