Item type | Current library | Home library | Shelving location | Call number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Reference Books | REF QA 76.9 .A25 C627 2013 (Browse shelf(Opens below)) | Not for loan | 5101631 |
Part I Overview of System and Network Security: A Comprehensive Introduction -- Chapter 1 Building a Secure Organization -- Chapter 2 A Cryptography Primer -- Chapter 3 Detecting System Intrusions -- Chapter 4 Preventing System Intrusions -- Chapter 5 Guarding against network intrusion -- Chapter 6 Securing Cloud Computing Systems -- Chapter 7 Fault Tolerance and Resilience in Cloud Computing Environments -- Chapter 8 Securing Web Applications, Services and Servers -- Chapter 9 Unix and Linux Security -- Chapter 10 Eliminating the Security Weakness of Linux and UNIX Operating Systems -- Chapter 11 Internet Security -- Chapter 12 The Botnet Problem -- Chapter 13 Intranet Security -- Chapter 14 Local Area Network Security -- Chapter 15 Wireless Network Security -- Chapter 16 Wireless Sensor Network Security -- Chapter 17 Cellular Network Security -- Chapter 18 RFID Security -- Chapter 19 Optical Network Security -- Chapter 20 -- Optical Wireless Security -- Part II Managing Information Security -- Chapter 21 Information Security Essentials for IT Managers: Protecting Mission-Critical Systems -- Chapter 22 Security Management Systems -- Chapter 23 Policy-driven System Management -- Chapter 24 Information Technology Security Management -- Chapter 25 Online Identity and User Management Services-- Chapter 26 Intrusion Prevention and Detection Systems-- Chapter 27 TCP/IP Packet Analysis -- Chapter 28 The Enemy (The Intruder’s Genesis) --Chapter 29 Firewalls -- Chapter 30 Penetration Testing -- Chapter 31 What Is Vulnerability Assessment? -- Chapter 32 Security Metrics: An Introduction and Literature Review-- Part III Cyber, Network, and Systems Forensics Security and Assurance -- Chapter 33 Cyber Forensics-- Chapter 34 Cyber Forensics and Incident Response -- Chapter 35 Securing e-Discovery -- Chapter 36 Network Forensics -- Part IV Encryption Technology -- Chapter 37 Data Encryption -- Chapter 38 Satellite Encryption -- Chapter 39 Public Key Infrastructure(Online Chapter) -- Chapter 40 Password-based Authenticated Key Establishment Protocols -- Chapter 41 Instant-Messaging Security -- Part V Privacy and Access Management -- Chapter 42 Privacy on the Internet -- Chapter 43 Privacy-Enhancing Technologies -- Chapter 44 Personal Privacy Policies -- Chapter 45 Detection Of Conflicts In Security Policies -- Chapter 46 Supporting User Privacy Preferences in Digital Interactions -- Chapter 47 Privacy and Security in Environmental Monitoring Systems: Issues and Solutions -- Chapter 48 Virtual Private Networks -- Chapter 49 Identity Theft --Chapter 50 VoIP Security -- Part VI Storage Security -- Chapter 51 SAN Security(Online Chapter) -- Chapter 52 Storage Area Networking Security Devices -- Chapter 53 Risk Management -- Part VII Physical Security -- Chapter 54 Physical Security Essentials -- Chapter 55 Disaster Recovery -- Chapter 56 Biometrics -- Chapter 57 Homeland Security(Online Chapter) -- Chapter 58 Cyber Warfare {u2013}Part VIII Practical Security -- Chapter 59 System Security -- Chapter 60 Securing the Infrastructure -- Chapter 61 Access Controls -- Chapter 62 Assessments and Audits {u2013}Chapter 63 Fundamentals of Cryptography -- Part IX Advanced Security --Chapter 64 Security Through Diversity -- Chapter 65 Online e-Reputation Management Services -- Chapter 66 Content Filtering -- Chapter 67 Data Loss Protection -- Chapter 68 Satellite Cyber Attack Search and Destroy -- Chapter 69 Verifiable Voting Systems -- Chapter 70 Advanced Data Encryption.
Includes bibliographical references and index.
There are no comments on this title.