Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.188.8.131.52 Smart Cards Smart cards are usually about the size of a credit card and contain a chip with logic functions and information that ... with data that the user provides (e.g., a personal ID number or biometric data) to verify authorization to access the computer or network. ... reviewed by security officers and database owners to identify and investigate successful or unsuccessful unauthorized accesses.
|Title||:||Information Security Management Handbook, Sixth Edition|
|Author||:||Harold F. Tipton, Micki Krause|
|Publisher||:||CRC Press - 2007-05-14|