Computer and information security handbook

  • 0 Ratings
  • 0 Want to read
  • 1 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 1 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by CoverBot
May 16, 2020 | History

Computer and information security handbook

  • 0 Ratings
  • 0 Want to read
  • 1 Currently reading
  • 0 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Language
English
Pages
844

Buy this book

Previews available in: English

Edition Availability
Cover of: Computer and information security handbook
Computer and information security handbook
2009, Elsevier, Morgan Kaufmann
in English

Add another edition?

Book Details


Published in

Amsterdam, Boston, Burlington, MA

Table of Contents

Overview of system and network security : a comprehensive introduction -- John Mallery
A cryptography primer -- Scott R. Ellis
Preventing system intrusions -- Michael West
Guarding against network intrusions -- Tom Chen and Patrick J. Walsh
Unix and Linux security -- Gerald Beuchelt
Eliminating the security weakness of Linux and Unix operating systems -- Mario Santana
Internet security -- Jesse Walker
The botnet problem -- Xinyuan Wang and Daniel ramsbrock
Intranet security -- Bill Mansoor
Local area network security -- Pramod Pandya
Wireless network security -- Chunming Rong and Erdal Cayirci
Cellular network security -- Peng Liu, Thomas F. LaPorta and Kameswari Kotapati
RFID security -- Chunming Rong and Erdal Cayirci
Information security essentials for IT managers, protecting mission-critical systems -- Albert Caballero
Security management systems -- Joe Wright and Jim Harmening
Information technology security management -- Rahul Bhasker and Bhushan Kapoor
Identity management -- Jean-Marc Seigneur and Tewfiq El Malika
Intrusion prevention and detection systems -- Christopher Day
Computer forensics -- Scott R. Ellis
Network forensics -- Yong Guan
Firewalls -- Errin W. Fulp
Penetration testing -- Sanjay Bavisi
What is vulnerability assessment? -- Almantas Kakareka
Data encryption -- Bhushan Kapoor and Pramod Pandya
Satellite encryption -- Daniel S. Soper
Public key infrastructure -- Terence Spies
Instant-messaging security -- Samuel J.J. Curry
NET privacy -- Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna
Personal privacy policies -- George Yee and Larry Korba
Virtual private networks -- Jim Harmening and Joe Wright
Identity theft -- Markus Jacobsson and Alex Tsow
VoIP security -- Dan Wing and Harsh Kupwade Patil
SAN security -- John McGowan, Jeffrey Bardin and John McDonald
Storage area networking devices security -- Robert Rounsavall
Risk management -- Sokratis K. Katsikas
Physical security essentials -- William Stallings
Biometrics -- Luther Martin
Homeland security -- Rahul Bhaskar and Bhushan Kapoor
Information warfare -- Jan Eloff and Anna Granova
Security through diversity -- Kevin Noble
Reputation management -- Jean-Marc Seigneur
Content filtering -- Peter Nicoletti
Data loss protection -- Ken Perkins -- Appendix A:
Configuring authentication service on Microsoft Windows Vista -- John R. Vacca -- Appendix B:
Security management and resiliency -- John R. Vacca -- Appendix C:
List of top security implementation and deployment companies -- -- Appendix D:
List of security products -- -- Appendix E:
List of security standards -- -- Appendix F:
List of miscellaneous security resources -- -- Appendix G:
Ensuring built-in frequency hopping spread spectrum wireless network security -- -- Appendix H:
Configuring wireless internet security remote access -- -- Appendix I:
Frequently asked questions ---- Appendix J: Glossary.

Edition Notes

Includes bibliographical references and index.

Series
The Morgan Kaufmann series in computer security

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 C627 2009

The Physical Object

Pagination
xxxii, 844 p. :
Number of pages
844

ID Numbers

Open Library
OL24537142M
Internet Archive
computerinformat00vacc
ISBN 10
0123743540
ISBN 13
9780123743541
LCCN
2009499916
OCLC/WorldCat
299240534

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
May 16, 2020 Edited by CoverBot Added new cover
April 6, 2014 Edited by ImportBot Added IA ID.
November 16, 2011 Edited by LC Bot import new book
December 15, 2010 Created by ImportBot Imported from Library of Congress MARC record.