Computer and information security handbook
The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice a...
Saved in:
| Other Authors: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, Mass.
Morgan Kaufmann
2013
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100727 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025545.0 | ||
| 008 | 141013s2013 maua bi 000 0 eng d | ||
| 020 | |a 9780123943972 (alk. paper) | ||
| 020 | |a 9780123946126 | ||
| 020 | |a 0123946123 | ||
| 039 | 9 | |a 201504091252 |b zul |c 201411131701 |d shahrim |c 201411131700 |d shahrim |y 201410132056 |z syarifuddin | |
| 040 | |a UPNM | ||
| 090 | |a QA76.9 .A25 |b .C627 2013 | ||
| 245 | 0 | 0 | |a Computer and information security handbook |c editor, John R. Vacca |
| 250 | |a 2nd ed. | ||
| 260 | |a Waltham, Mass. |b Morgan Kaufmann |c 2013 | ||
| 300 | |a xxviii, 1171 p. |b ill. |c 29 cm. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a pt. I Overview of System and Network Security: A Comprehensive Introduction -- 1. Building a Secure Organization / John Mallery -- 2. A Cryptography Primer / Scott R. Ellis -- 3. Detecting System Intrusions / Almantas Kakareka -- 4. Preventing System Intrusions / Michael West -- 5. Guarding Against Network Intrusions / Patrick J. Walsh -- 6. Securing Cloud Computing Systems / Cem Gurkok -- 7. Fault Tolerance and Resilience in Cloud Computing Environments / Vincenzo Piuri -- 8. Securing Web Applications, Services, and Servers / Gerald Beuchelt -- 9.Unix and Linux Security / Gerald Beuchelt -- 10. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana -- 11. Internet Security / Jesse Walker -- 12. The Botnet Problem / Xinyuan Wang -- 13. Intranet Security / Bill Mansoor -- 14. Local Area Network Security / Dr. Pramod Pandya -- 15. Wireless Network Security / Hongbing Cheng -- 16. Wireless Sensor Network Security / Thomas M. Chen -- 17.Cellular Network Security / Kameswari Kotapati --18. RFID Security / Hongbing Cheng -- 19.Optical Network Security / Lauren Collins -- 20. Optical Wireless Security / Scott R. Ellis -- pt. II Managing Information Security -- 21. Information Security Essentials for IT Managers: Protecting Mission-Critical Systems / Albert Caballero -- 22. Security Management Systems / James T. Harmening -- 23. Policy-driven System Management / Stefano Paraboschi -- 24. Information Technology Security Management / Bhushan Kapoor -- 25. Online Identity and User Management Services / Jean-Marc Seigneur -- pt. VII Physical Security -- 54. Physical Security Essentials / William Stallings -- 55. Disaster Recovery / Lauren Collins -- 56. Biometrics / Luther Martin -- 57. Homeland Security (online chapter) / Bhushan Kapoor -- 58. Cyber Warfare / Marco Slaviero -- pt. VIII Practical Security -- 59.System Security / Lauren Collins -- 60. Securing the Infrastructure / Lauren Collins -- 61. Access Controls / Lauren Collins -- 62. Assessments and Audits / Lauren Collins -- 63. Fundamentals of Cryptography / Scott R. Ellis -- 64. Security Through Diversity / Kevin Noble -- 65.Online e-Reputation Management Services / Jean-Marc Seigneur -- 66. Content Filtering (online chapter) / Pete Nicoletti -- 67.Data Loss Protection / Ken Perkins -- 68. Satellite Cyber Attack Search and Destroy / Jeffrey Bardin -- 69.Verifiable Voting Systems / Zhe Xia -- 70. Advanced Data Encryption / Pramod Pandya. | |
| 520 | |a The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions. | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM519.80 |h PVK | ||
| 650 | 0 | |a Computer networks |x Security measures. | |
| 650 | 0 | |a Penetration testing (Computer security). | |
| 700 | 1 | |a Vacca, John R | |
| 999 | |a vtls000052963 |c 100727 |d 100727 | ||


