© 2012 – Auerbach Publications
Updated annually, the Information Security Management Handbookis the most comprehensive and up-to-date reference available on information security and risk management. Bringing togetherthe knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
Reporting on the latest developments in information security, this volume features 31 new entries on Social Networking, Secure Software Lifecycle, Insider Threat, Application Whitelisting, Server Virtualization, Security Requirements Analysis, CERT Resilience Management Model, Continuous Monitoring, Service-Oriented Architecture, Cloud Security, Managing Advanced Persistent Threats, Virtualization Forensics, Protected Health Information under HIPAA and HITECH, and more. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications.
This 2012 CD-ROM Edition contains the complete contents of every annual edition of the handbook since 1997, including 2012. It is an authoritative resource that is linked, searchable by keyword, and organized under the CISSP® CBK® domains. In addition to the complete contents of the set, the CD-ROM includes an extra volume’s worth of information—including chapters from other security and networking books that have never appeared in the print edition of the Information Security Management Handbook.
… at over 6,900 pages, the current edition is a compendium of all previous editions. … It has 31 new entries for 2012, and with every article from the first edition of 1997, the handbook is comprehensive … . With articles from luminaries such as Ray Kaplan, Paul Henry, Dan Houser, Ed Skoudis Rebecca Herold, Mano Paul, Anton Chuvakin, and many more, the Information Security Management Handbook – 2012 is one of the most complete information security references available.
—Ben Rothke, Security Reading Room, https://365.rsaconference.com/blogs/securityreading