Hardcover: 3280 pages
Publisher: CRC Press; 6 edition (May 14, 2007)
Language: English
ISBN-10: 0849374952
ISBN-13: 978-0849374951
Product Dimensions: 10.3 x 3.5 x 14.1 inches
Shipping Weight: 15.6 pounds (View shipping rates and policies)
Average Customer Review: 4.0 out of 5 stars See all reviews (8 customer reviews)
Best Sellers Rank: #1,302,960 in Books (See Top 100 in Books) #312 in Books > Computers & Technology > Certification > CompTIA #444 in Books > Business & Money > Insurance > Risk Management #555 in Books > Business & Money > Economics > Commerce
Due to this item's unusual size or weight, it requires special handling and will ship separately from other items in your order. Read More
I have the Sixth Edition. Yes, it is 3000+ pages and is printed on wafer thin paper.The content is excellent for security professionals, particularly those at the management level. There are 220+ articles within the 10 (ISC)2 domains on a wide variety of topics. Most of the stuff is higher level but just technical enough for you to have confidence in the concepts presented. It would probably be typical that you'd read an article in here for one of three reasons: background research for an immediate decision that doesn't require detailed technical knowledge; introduction to concepts that will require further in-depth research; or research for a presentation to senior management, in which case you'd have to distill and simplify conceptually (something you're probably already used to).You will find multiple articles on single topics- some more complete than others, and potentially with a variety of perspectives, so you'll have to make your own calls on what's presented. It's not a "InfoSec Management for Dummies" book that will give you easy answers to your problem or a step-by-step "how to implement an InfoSec program" guide; it's more like an encyclopedia for research that you can use to factor into making your own, independent decisions. For example, there's not a lot of specifics on actual risk assessment techniques, but there are high level articles on the principles.I wish each of the individual articles were specifically dated so I'd know the time context; seeing a statement like "the position of CISO was virtually unheard of five years ago" or even "80 percent of companies monitor their employees' email" means less without knowing when the article was written.
Information Security Management Handbook, 6th Edition Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Security Risk Management: Building an Information Security Risk Management Program from the Ground Up Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust) Drug Information Handbook: A Clinically Relevant Resource for All Healthcare Professionals (Drug Information Handbook (Domestic Ed)) Managing Risk In Information Systems (Information Systems Security & Assurance) Collection Management Basics, 6th Edition (Library and Information Science Text) Management Accounting: Information for Decision-Making and Strategy Execution (6th Edition) Risk Management for Computer Security: Protecting Your Network and Information Assets Management Information Systems for the Information Age Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset Security Analysis: Sixth Edition, Foreword by Warren Buffett (Security Analysis Prior Editions) Managing Information Technology: What Managers Need to Know: 6th (Sixfth) Edition Fluency With Information Technology (6th Edition) Introduction to Information Systems, 6th Edition Managing and Using Information Systems: A Strategic Approach, 6th Edition Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption Programmer's Ultimate Security DeskRef: Your programming security encyclopedia