Computer and information security handbook

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
August 2, 2020 | History

Computer and information security handbook

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails, IP sniffing/spoofing, etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. --from publisher description

Publish Date
Pages
844

Buy this book

Edition Availability
Cover of: Computer and information security handbook
Computer and information security handbook
2009, Elsevier, Elsevier/Morgan Kaufmann

Add another edition?

Book Details


Published in

Amsterdam ; Boston

Edition Notes

Overview of system and network security : a comprehensive introduction / John Mallery -- Cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- Botnet problem / Xinyuan Wang and Daniel Ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A : Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B : Security management and resiliency / John R. Vacca -- Appendix C : List of top security implementation and deployment companies -- Appendix D : List of security products -- Appendix E : List of security standards -- Appendix F : List of miscellaneous security resources -- Appendix G : Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H : Configuring wireless internet security remote access -- Appendix I : Frequently asked questions -- Appendix J : Glossary.

Series
Morgan Kaufmann series in computer security

Classifications

Library of Congress
TK5105.59, QA76.9.A25 C627 2009, TK5105.59 .C66 2009

The Physical Object

Pagination
xxxii, 844 p.
Number of pages
844
Dimensions
29 cm.

ID Numbers

Open Library
OL24198233M
Internet Archive
computerinformat00vacc_274
ISBN 10
0123743540
ISBN 13
9780123743541
LCCN
2009499916
OCLC/WorldCat
299240534

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
August 2, 2020 Edited by ImportBot import existing book
June 29, 2019 Edited by MARC Bot import existing book
July 29, 2014 Created by ImportBot import new book