Computer and information security handbook

The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice a...

Full description

Saved in:
Bibliographic Details
Other Authors: Vacca, John R
Format: Book
Language:English
Published: Waltham, Mass. Morgan Kaufmann 2013
Edition:2nd ed.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • pt. I Overview of System and Network Security: A Comprehensive Introduction
  • 1. Building a Secure Organization / John Mallery
  • 2. A Cryptography Primer / Scott R. Ellis
  • 3. Detecting System Intrusions / Almantas Kakareka
  • 4. Preventing System Intrusions / Michael West
  • 5. Guarding Against Network Intrusions / Patrick J. Walsh
  • 6. Securing Cloud Computing Systems / Cem Gurkok
  • 7. Fault Tolerance and Resilience in Cloud Computing Environments / Vincenzo Piuri
  • 8. Securing Web Applications, Services, and Servers / Gerald Beuchelt
  • 9.Unix and Linux Security / Gerald Beuchelt
  • 10. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana
  • 11. Internet Security / Jesse Walker
  • 12. The Botnet Problem / Xinyuan Wang
  • 13. Intranet Security / Bill Mansoor
  • 14. Local Area Network Security / Dr. Pramod Pandya
  • 15. Wireless Network Security / Hongbing Cheng
  • 16. Wireless Sensor Network Security / Thomas M. Chen
  • 17.Cellular Network Security / Kameswari Kotapati
  • 18. RFID Security / Hongbing Cheng
  • 19.Optical Network Security / Lauren Collins
  • 20. Optical Wireless Security / Scott R. Ellis
  • pt. II Managing Information Security
  • 21. Information Security Essentials for IT Managers: Protecting Mission-Critical Systems / Albert Caballero
  • 22. Security Management Systems / James T. Harmening
  • 23. Policy-driven System Management / Stefano Paraboschi
  • 24. Information Technology Security Management / Bhushan Kapoor
  • 25. Online Identity and User Management Services / Jean-Marc Seigneur
  • pt. VII Physical Security
  • 54. Physical Security Essentials / William Stallings
  • 55. Disaster Recovery / Lauren Collins
  • 56. Biometrics / Luther Martin
  • 57. Homeland Security (online chapter) / Bhushan Kapoor
  • 58. Cyber Warfare / Marco Slaviero
  • pt. VIII Practical Security
  • 59.System Security / Lauren Collins
  • 60. Securing the Infrastructure / Lauren Collins
  • 61. Access Controls / Lauren Collins
  • 62. Assessments and Audits / Lauren Collins
  • 63. Fundamentals of Cryptography / Scott R. Ellis
  • 64. Security Through Diversity / Kevin Noble
  • 65.Online e-Reputation Management Services / Jean-Marc Seigneur
  • 66. Content Filtering (online chapter) / Pete Nicoletti
  • 67.Data Loss Protection / Ken Perkins
  • 68. Satellite Cyber Attack Search and Destroy / Jeffrey Bardin
  • 69.Verifiable Voting Systems / Zhe Xia
  • 70. Advanced Data Encryption / Pramod Pandya.