Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Front Cover
Contents
Introduction
Contributors
Chapter 1 - Securing the Grid
Chapter 2 - Attacks in Mobile Environments
Chapter 3 - Security in the Cloud
Chapter 4 - Getting the Best Out of Information Security Projects
Chapter 5 - Mobility and Its Impact on Enterprise Security
Chapter 6 - An Introduction to Digital Rights Management
Chapter 7 - Information Security on the Cheap
Chapter 8 - Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program
Chapter 9 - Metrics for Monitoring
Chapter 10 - Security Implications of Bring Your Own Device, IT Consumerization, and Managing User Choices
Chapter 11 - Information Assurance: Open Research Questions and Future Directions
Chapter 12 - Protecting Us from Us: Human Firewall Vulnerability Assessments
Chapter 13 - Service-Oriented Architecture
Chapter 14 - Managing the Security Testing Process
Chapter 15 - Security and Resilience in the Software Development Life Cycle
Chapter 16 - Cloud Cryptography
Chapter 17 - Identity and Access Management Architecture
Chapter 18 - FedRAMP: Entry or Exit Ramp for Cloud Security?
Chapter 19 - Data Storage and Network Security
Chapter 20 - National Patient Identifier and Patient Privacy in the Digital Era
Chapter 21 - Addressing Social Media Security and Privacy Challenges
Chapter 22 - What Is Digital Forensics and What Should You Know about It?
Chapter 23 - eDiscovery
Chapter 24 - Overview of the Steps of the Electronic Discovery Reference Model
Chapter 25 - Cell Phone Protocols and Operating Systems
Chapter 26 - Hacktivism: The Whats, Whys, and Wherefores
Chapter 27 - PCI Compliance
Chapter 28 - HIPAA/HITECH Compliance Overview
Information Security Management Handbook: Comprehensive Table of Contents
Back Cover
← Prev
Back
Next →
← Prev
Back
Next →