FifthEditionInformationSecurityManagementHandbook©2004byCRCPressLLCAUERBACHPUBLICATIONSwww.auerbach-publications.comToOrderCall:1-800-272-7737•Fax:1-800-374-3401E-mail:orders@crcpress.comAssetProtectionandSecurityManagementHandbookPOAPublishingISBN:0-8493-1603-0BuildingaGlobalInformationAssuranceProgramRaymondJ.CurtsandDouglasE.CampbellISBN:0-8493-1368-6BuildinganInformationSecurityAwarenessProgramMarkB.DesmanISBN:0-8493-0116-5CriticalIncidentManagementAlanB.SterneckertISBN:0-8493-0010-XCyberCrimeInvestigator'sFieldGuideBruceMiddletonISBN:0-8493-1192-6CyberForensics:AFieldManualforCollecting,Examining,andPreservingEvidenceofComputerCrimesAlbertJ.Marcella,Jr.andRobertS.GreenfieldISBN:0-8493-0955-7TheEthicalHack:AFrameworkforBusinessValuePenetrationTestingJamesS.TillerISBN:0-8493-1609-XTheHacker'sHandbook:TheStrategyBehindBreakingintoandDefendingNetworksSusanYoungandDaveAitelISBN:0-8493-0888-7InformationSecurityArchitecture:AnIntegratedApproachtoSecurityintheOrganizationJanKillmeyerTudorISBN:0-8493-9988-2InformationSecurityFundamentalsThomasR.PeltierISBN:0-8493-1957-9InformationSecurityManagementHandbook,5thEditionHaroldF.TiptonandMickiKrauseISBN:0-8493-1997-8InformationSecurityPolicies,Procedures,andStandards:GuidelinesforEffectiveInformationSecurityManagementThomasR.PeltierISBN:0-8493-1137-3InformationSecurityRiskAnalysisThomasR.PeltierISBN:0-8493-0880-1InformationTechnologyControlandAuditFredrickGallegos,DanielManson,andSandraAllen-SenftISBN:0-8493-9994-7Investigator'sGuidetoSteganographyGregoryKipper0-8493-2433-5ManagingaNetworkVulnerabilityAssessmentThomasPeltier,JustinPeltier,andJohnA.BlackleyISBN:0-8493-1270-1NetworkPerimeterSecurity:BuildingDefenseIn-DepthCliffRiggsISBN:0-8493-1628-6ThePracticalGuidetoHIPAAPrivacyandSecurityComplianceKevinBeaverandRebeccaHeroldISBN:0-8493-1953-6APracticalGuidetoSecurityEngineeringandInformationAssuranceDebraS.HerrmannISBN:0-8493-1163-2ThePrivacyPapers:ManagingTechnology,Consumer,EmployeeandLegislativeActionsRebeccaHeroldI...