- List Price: $290.00
- Save: $233.31 (80%)
- FREE return shipping at the end of the semester.
- Access codes and supplements are not guaranteed with rentals.
Rented from RentU
Fulfilled by Amazon
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and .
If you're a seller, Fulfillment by Amazon can help you grow your business. Learn more about the program.
Other Sellers on Amazon
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
+ $3.99 shipping
86% positive over last 12 months

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera - scan the code below and download the Kindle app.


Follow the Authors
OK
Information Security Management Handbook, 6th Edition 6th Edition
Harold F. Tipton (Author) Find all the books, read about the author, and more. See search results for this author |
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.
- ISBN-100849374952
- ISBN-13978-0849374951
- Edition6th
- PublisherCRC Press
- Publication dateMay 14, 2007
- LanguageEnglish
- Dimensions10.3 x 3.5 x 14.1 inches
- Print length3280 pages
Books with Buzz
Discover the latest buzz-worthy books, from mysteries and romance to humor and nonfiction. Explore more
Customers who bought this item also bought
Product details
- Publisher : CRC Press; 6th edition (May 14, 2007)
- Language : English
- Hardcover : 3280 pages
- ISBN-10 : 0849374952
- ISBN-13 : 978-0849374951
- Item Weight : 14.7 pounds
- Dimensions : 10.3 x 3.5 x 14.1 inches
- Best Sellers Rank: #675,188 in Books (See Top 100 in Books)
- #86 in CompTIA Certification Guides
- #87 in LANs (Books)
- #152 in Risk Management (Books)
- Customer Reviews:
About the authors
Dr. Anton Chuvakin (http://www.chuvakin.org/) is a Research Director at Gartner's Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management" and "PCI Compliance" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, security management. His blog "Security Warrior" was one of the most popular in the industry.
In addition, Anton taught classes and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He worked on emerging security standards and served on advisory boards of several security start-ups.
Most recently, Anton was running his own security consulting practice, focusing on logging, SIEM and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.
Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews right now. Please try again later.
I gave it a 2 star because I was disappointed at the number of errors and omissions I discovered in this book, for example chapter 4 has 4 dates for ITGI's begining which are all wrong, Chapter 8 has the correct date. as matter of fact if I was the editor of the book, I would remove the entire chapter 4. I was happy to see Kevin Henry bring up the "placement of security" but he does not take it far enough. So chapter 14 we are back to "IT" based information security. I think it is time for security experts to start writing outside the box, most companies have confidential information that is not "IT" related, take contracts as an example.
Chapter 76 "Intrusion in information system security simply means the attempts or actions of unauthorized entry into an IT system. " really!, this is 1990's way of thinking Gildas Deograt-Lumy Roy Naldo Please read The Art of Intrusion by Kevin D. Mitnick.
I would write a book describing all that is wrong with this book, only if I had the time and writing skills some of which was wasted reading this book, Oh by the way Mr.Ralph Spencer Poore, there are so many exciting new standards coming up with cryptographic key management you should have and could have written about, such as the 1619.3, but I guess I have to read yet another book to learn about it.
The content is excellent for security professionals, particularly those at the management level. There are 220+ articles within the 10 (ISC)2 domains on a wide variety of topics. Most of the stuff is higher level but just technical enough for you to have confidence in the concepts presented. It would probably be typical that you'd read an article in here for one of three reasons: background research for an immediate decision that doesn't require detailed technical knowledge; introduction to concepts that will require further in-depth research; or research for a presentation to senior management, in which case you'd have to distill and simplify conceptually (something you're probably already used to).
You will find multiple articles on single topics- some more complete than others, and potentially with a variety of perspectives, so you'll have to make your own calls on what's presented. It's not a "InfoSec Management for Dummies" book that will give you easy answers to your problem or a step-by-step "how to implement an InfoSec program" guide; it's more like an encyclopedia for research that you can use to factor into making your own, independent decisions. For example, there's not a lot of specifics on actual risk assessment techniques, but there are high level articles on the principles.
I wish each of the individual articles were specifically dated so I'd know the time context; seeing a statement like "the position of CISO was virtually unheard of five years ago" or even "80 percent of companies monitor their employees' email" means less without knowing when the article was written.
I could probably find a lot of similar information Googling for it, but Google doesn't seem to be what it once was (or the Internet for that matter... so much for the days of shared research) and my time is too valuable to spend a lot of it culling through blogs, noisy forums, and marketing junk disguised as whitepapers to get this information.
For the record, I have passed the CISSP exam. I did not use this book, nor would I recommend it as a study guide. I bought this particular book because I needed it as a reference for my work. If you mastered this book cover to cover and didn't read anything else, you'd probably do OK on the exam, but there are far more efficient means to getting there.
It is a fairly easy read and is modular, but after I have used it for my courses I won't be keeping it for reference. It is far too dated.