Introduction
Chapter 1 Information Security Governance and Risk Management
Chapter 2 Access Control
Chapter 3 Cryptography
Chapter 4 Physical (Environmental) Security
Chapter 5 Security Architecture and Design
Chapter 6 Legal, Regulations, Investigations and Compliance
Chapter 7 Telecommunications and Network security
Chapter 8 Business Continuity and Disaster Recovery Planning
Chapter 9 Software Development Security
Chapter 10 Operations Security
Appendix A Additional Resources
Index
Publication Year |
|
Edition Type |
|
Authored By |
|