As shown in Screen 12, it is good to take every opportunity, including within your training modules, to let your personnel know the person or position within your organization that they can contact for more information, or for concerns.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security.
The incredible growth of WLANs and the overwhelming acceptance of VoIP have merged to form the foundation for Voice over Wireless LAN (VoWLAN), sometimes referred to as Voice over Wireless Fidelity (VoWiFi). The use of VoIP, ...
Frankel, S., Demystifying the IPSec Puzzle, Artech House Inc., 2001. Harkins, D., and Carrel, D., The Internet Key Exchange (IKE), RFC 2409, November 1998. 7. Kent, S., and Atkinson, R., Security Architecture for the Internet Protocol, ...
In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.
This handbook is also available on CD.
This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security.