000 | 04897cam a2200409 i 4500 | ||
---|---|---|---|
001 | 39658 | ||
003 | AE-DuAU | ||
005 | 20241127174530.0 | ||
008 | 130529s2013 ne a b 001 0 eng | ||
010 | _a 2013020996 | ||
020 |
_a9780123943972 : _c129.95 |
||
020 |
_a0123943973 : _c129.95 |
||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bC627 2013 |
069 | _a09758044 | ||
090 | _aREF QA 76.9 .A25 C627 2013 | ||
090 | _aREF QA 76.9 .A25 C627 2013 | ||
245 | 0 | 0 |
_aComputer and information security handbook / _cedited by John R. Vacca. |
250 | _aSecond edition. | ||
260 |
_aAmsterdam : _bElsevier, Morgan Kaufmann, _c[2013]. |
||
300 |
_axxviii, 1171 pages : _billustrations ; _c29 cm |
||
336 |
_2rdacontent _atext _btxt |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
505 | 0 | _aPart I Overview of System and Network Security: A Comprehensive Introduction -- Chapter 1 Building a Secure Organization -- Chapter 2 A Cryptography Primer -- Chapter 3 Detecting System Intrusions -- Chapter 4 Preventing System Intrusions -- Chapter 5 Guarding against network intrusion -- Chapter 6 Securing Cloud Computing Systems -- Chapter 7 Fault Tolerance and Resilience in Cloud Computing Environments -- Chapter 8 Securing Web Applications, Services and Servers -- Chapter 9 Unix and Linux Security -- Chapter 10 Eliminating the Security Weakness of Linux and UNIX Operating Systems -- Chapter 11 Internet Security -- Chapter 12 The Botnet Problem -- Chapter 13 Intranet Security -- Chapter 14 Local Area Network Security -- Chapter 15 Wireless Network Security -- Chapter 16 Wireless Sensor Network Security -- Chapter 17 Cellular Network Security -- Chapter 18 RFID Security -- Chapter 19 Optical Network Security -- Chapter 20 -- Optical Wireless Security -- Part II Managing Information Security -- Chapter 21 Information Security Essentials for IT Managers: Protecting Mission-Critical Systems -- Chapter 22 Security Management Systems -- Chapter 23 Policy-driven System Management -- Chapter 24 Information Technology Security Management -- Chapter 25 Online Identity and User Management Services-- Chapter 26 Intrusion Prevention and Detection Systems-- Chapter 27 TCP/IP Packet Analysis -- Chapter 28 The Enemy (The Intruder’s Genesis) --Chapter 29 Firewalls -- Chapter 30 Penetration Testing -- Chapter 31 What Is Vulnerability Assessment? -- Chapter 32 Security Metrics: An Introduction and Literature Review-- Part III Cyber, Network, and Systems Forensics Security and Assurance -- Chapter 33 Cyber Forensics-- Chapter 34 Cyber Forensics and Incident Response -- Chapter 35 Securing e-Discovery -- Chapter 36 Network Forensics -- Part IV Encryption Technology -- Chapter 37 Data Encryption -- Chapter 38 Satellite Encryption -- Chapter 39 Public Key Infrastructure(Online Chapter) -- Chapter 40 Password-based Authenticated Key Establishment Protocols -- Chapter 41 Instant-Messaging Security -- Part V Privacy and Access Management -- Chapter 42 Privacy on the Internet -- Chapter 43 Privacy-Enhancing Technologies -- Chapter 44 Personal Privacy Policies -- Chapter 45 Detection Of Conflicts In Security Policies -- Chapter 46 Supporting User Privacy Preferences in Digital Interactions -- Chapter 47 Privacy and Security in Environmental Monitoring Systems: Issues and Solutions -- Chapter 48 Virtual Private Networks -- Chapter 49 Identity Theft --Chapter 50 VoIP Security -- Part VI Storage Security -- Chapter 51 SAN Security(Online Chapter) -- Chapter 52 Storage Area Networking Security Devices -- Chapter 53 Risk Management -- Part VII Physical Security -- Chapter 54 Physical Security Essentials -- Chapter 55 Disaster Recovery -- Chapter 56 Biometrics -- Chapter 57 Homeland Security(Online Chapter) -- Chapter 58 Cyber Warfare {u2013}Part VIII Practical Security -- Chapter 59 System Security -- Chapter 60 Securing the Infrastructure -- Chapter 61 Access Controls -- Chapter 62 Assessments and Audits {u2013}Chapter 63 Fundamentals of Cryptography -- Part IX Advanced Security --Chapter 64 Security Through Diversity -- Chapter 65 Online e-Reputation Management Services -- Chapter 66 Content Filtering -- Chapter 67 Data Loss Protection -- Chapter 68 Satellite Cyber Attack Search and Destroy -- Chapter 69 Verifiable Voting Systems -- Chapter 70 Advanced Data Encryption. | |
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _9174138 |
|
650 | 0 |
_aPenetration testing (Computer security) _9174139 |
|
700 | 1 |
_aVacca, John R. _9174140 |
|
852 | 1 | _9P129.95usd | |
907 |
_a39658 _b12-12-13 _c12-08-13 |
||
942 |
_cREF _00 |
||
998 |
_aref _b12-08-13 _cm _da _en _feng _gne _h0 |
||
945 |
_g0 _i5101631 _j0 _lref _o- _p478.00 _q- _r- _s- _t2 _u0 _v0 _w0 _x0 _yi15632234 _z12-08-13 |
||
999 |
_c39658 _d39658 |