Check nearby libraries
Buy this book

This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book

Edition | Availability |
---|---|
1
Computer and information security handbook
2009, Elsevier, Morgan Kaufmann
in English
0123743540 9780123743541
|
aaaa
|
Book Details
Table of Contents
Overview of system and network security : a comprehensive introduction -- John Mallery
A cryptography primer -- Scott R. Ellis
Preventing system intrusions -- Michael West
Guarding against network intrusions -- Tom Chen and Patrick J. Walsh
Unix and Linux security -- Gerald Beuchelt
Eliminating the security weakness of Linux and Unix operating systems -- Mario Santana
Internet security -- Jesse Walker
The botnet problem -- Xinyuan Wang and Daniel ramsbrock
Intranet security -- Bill Mansoor
Local area network security -- Pramod Pandya
Wireless network security -- Chunming Rong and Erdal Cayirci
Cellular network security -- Peng Liu, Thomas F. LaPorta and Kameswari Kotapati
RFID security -- Chunming Rong and Erdal Cayirci
Information security essentials for IT managers, protecting mission-critical systems -- Albert Caballero
Security management systems -- Joe Wright and Jim Harmening
Information technology security management -- Rahul Bhasker and Bhushan Kapoor
Identity management -- Jean-Marc Seigneur and Tewfiq El Malika
Intrusion prevention and detection systems -- Christopher Day
Computer forensics -- Scott R. Ellis
Network forensics -- Yong Guan
Firewalls -- Errin W. Fulp
Penetration testing -- Sanjay Bavisi
What is vulnerability assessment? -- Almantas Kakareka
Data encryption -- Bhushan Kapoor and Pramod Pandya
Satellite encryption -- Daniel S. Soper
Public key infrastructure -- Terence Spies
Instant-messaging security -- Samuel J.J. Curry
NET privacy -- Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna
Personal privacy policies -- George Yee and Larry Korba
Virtual private networks -- Jim Harmening and Joe Wright
Identity theft -- Markus Jacobsson and Alex Tsow
VoIP security -- Dan Wing and Harsh Kupwade Patil
SAN security -- John McGowan, Jeffrey Bardin and John McDonald
Storage area networking devices security -- Robert Rounsavall
Risk management -- Sokratis K. Katsikas
Physical security essentials -- William Stallings
Biometrics -- Luther Martin
Homeland security -- Rahul Bhaskar and Bhushan Kapoor
Information warfare -- Jan Eloff and Anna Granova
Security through diversity -- Kevin Noble
Reputation management -- Jean-Marc Seigneur
Content filtering -- Peter Nicoletti
Data loss protection -- Ken Perkins -- Appendix A:
Configuring authentication service on Microsoft Windows Vista -- John R. Vacca -- Appendix B:
Security management and resiliency -- John R. Vacca -- Appendix C:
List of top security implementation and deployment companies -- -- Appendix D:
List of security products -- -- Appendix E:
List of security standards -- -- Appendix F:
List of miscellaneous security resources -- -- Appendix G:
Ensuring built-in frequency hopping spread spectrum wireless network security -- -- Appendix H:
Configuring wireless internet security remote access -- -- Appendix I:
Frequently asked questions ---- Appendix J: Glossary.
Edition Notes
Includes bibliographical references and index.
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created December 15, 2010
- 5 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
March 28, 2025 | Edited by ImportBot | Redacting ocaids |
May 16, 2020 | Edited by CoverBot | Added new cover |
April 6, 2014 | Edited by ImportBot | Added IA ID. |
November 16, 2011 | Edited by LC Bot | import new book |
December 15, 2010 | Created by ImportBot | Imported from Library of Congress MARC record |