Computer and information security handbook
The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice a...
Saved in:
| Other Authors: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, Mass.
Morgan Kaufmann
2013
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- pt. I Overview of System and Network Security: A Comprehensive Introduction
- 1. Building a Secure Organization / John Mallery
- 2. A Cryptography Primer / Scott R. Ellis
- 3. Detecting System Intrusions / Almantas Kakareka
- 4. Preventing System Intrusions / Michael West
- 5. Guarding Against Network Intrusions / Patrick J. Walsh
- 6. Securing Cloud Computing Systems / Cem Gurkok
- 7. Fault Tolerance and Resilience in Cloud Computing Environments / Vincenzo Piuri
- 8. Securing Web Applications, Services, and Servers / Gerald Beuchelt
- 9.Unix and Linux Security / Gerald Beuchelt
- 10. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana
- 11. Internet Security / Jesse Walker
- 12. The Botnet Problem / Xinyuan Wang
- 13. Intranet Security / Bill Mansoor
- 14. Local Area Network Security / Dr. Pramod Pandya
- 15. Wireless Network Security / Hongbing Cheng
- 16. Wireless Sensor Network Security / Thomas M. Chen
- 17.Cellular Network Security / Kameswari Kotapati
- 18. RFID Security / Hongbing Cheng
- 19.Optical Network Security / Lauren Collins
- 20. Optical Wireless Security / Scott R. Ellis
- pt. II Managing Information Security
- 21. Information Security Essentials for IT Managers: Protecting Mission-Critical Systems / Albert Caballero
- 22. Security Management Systems / James T. Harmening
- 23. Policy-driven System Management / Stefano Paraboschi
- 24. Information Technology Security Management / Bhushan Kapoor
- 25. Online Identity and User Management Services / Jean-Marc Seigneur
- pt. VII Physical Security
- 54. Physical Security Essentials / William Stallings
- 55. Disaster Recovery / Lauren Collins
- 56. Biometrics / Luther Martin
- 57. Homeland Security (online chapter) / Bhushan Kapoor
- 58. Cyber Warfare / Marco Slaviero
- pt. VIII Practical Security
- 59.System Security / Lauren Collins
- 60. Securing the Infrastructure / Lauren Collins
- 61. Access Controls / Lauren Collins
- 62. Assessments and Audits / Lauren Collins
- 63. Fundamentals of Cryptography / Scott R. Ellis
- 64. Security Through Diversity / Kevin Noble
- 65.Online e-Reputation Management Services / Jean-Marc Seigneur
- 66. Content Filtering (online chapter) / Pete Nicoletti
- 67.Data Loss Protection / Ken Perkins
- 68. Satellite Cyber Attack Search and Destroy / Jeffrey Bardin
- 69.Verifiable Voting Systems / Zhe Xia
- 70. Advanced Data Encryption / Pramod Pandya.


