000 04897cam a2200409 i 4500
001 39658
003 AE-DuAU
005 20241127174530.0
008 130529s2013 ne a b 001 0 eng
010 _a 2013020996
020 _a9780123943972 :
_c129.95
020 _a0123943973 :
_c129.95
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bC627 2013
069 _a09758044
090 _aREF QA 76.9 .A25 C627 2013
090 _aREF QA 76.9 .A25 C627 2013
245 0 0 _aComputer and information security handbook /
_cedited by John R. Vacca.
250 _aSecond edition.
260 _aAmsterdam :
_bElsevier, Morgan Kaufmann,
_c[2013].
300 _axxviii, 1171 pages :
_billustrations ;
_c29 cm
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
505 0 _aPart I Overview of System and Network Security: A Comprehensive Introduction -- Chapter 1 Building a Secure Organization -- Chapter 2 A Cryptography Primer -- Chapter 3 Detecting System Intrusions -- Chapter 4 Preventing System Intrusions -- Chapter 5 Guarding against network intrusion -- Chapter 6 Securing Cloud Computing Systems -- Chapter 7 Fault Tolerance and Resilience in Cloud Computing Environments -- Chapter 8 Securing Web Applications, Services and Servers -- Chapter 9 Unix and Linux Security -- Chapter 10 Eliminating the Security Weakness of Linux and UNIX Operating Systems -- Chapter 11 Internet Security -- Chapter 12 The Botnet Problem -- Chapter 13 Intranet Security -- Chapter 14 Local Area Network Security -- Chapter 15 Wireless Network Security -- Chapter 16 Wireless Sensor Network Security -- Chapter 17 Cellular Network Security -- Chapter 18 RFID Security -- Chapter 19 Optical Network Security -- Chapter 20 -- Optical Wireless Security -- Part II Managing Information Security -- Chapter 21 Information Security Essentials for IT Managers: Protecting Mission-Critical Systems -- Chapter 22 Security Management Systems -- Chapter 23 Policy-driven System Management -- Chapter 24 Information Technology Security Management -- Chapter 25 Online Identity and User Management Services-- Chapter 26 Intrusion Prevention and Detection Systems-- Chapter 27 TCP/IP Packet Analysis -- Chapter 28 The Enemy (The Intruder’s Genesis) --Chapter 29 Firewalls -- Chapter 30 Penetration Testing -- Chapter 31 What Is Vulnerability Assessment? -- Chapter 32 Security Metrics: An Introduction and Literature Review-- Part III Cyber, Network, and Systems Forensics Security and Assurance -- Chapter 33 Cyber Forensics-- Chapter 34 Cyber Forensics and Incident Response -- Chapter 35 Securing e-Discovery -- Chapter 36 Network Forensics -- Part IV Encryption Technology -- Chapter 37 Data Encryption -- Chapter 38 Satellite Encryption -- Chapter 39 Public Key Infrastructure(Online Chapter) -- Chapter 40 Password-based Authenticated Key Establishment Protocols -- Chapter 41 Instant-Messaging Security -- Part V Privacy and Access Management -- Chapter 42 Privacy on the Internet -- Chapter 43 Privacy-Enhancing Technologies -- Chapter 44 Personal Privacy Policies -- Chapter 45 Detection Of Conflicts In Security Policies -- Chapter 46 Supporting User Privacy Preferences in Digital Interactions -- Chapter 47 Privacy and Security in Environmental Monitoring Systems: Issues and Solutions -- Chapter 48 Virtual Private Networks -- Chapter 49 Identity Theft --Chapter 50 VoIP Security -- Part VI Storage Security -- Chapter 51 SAN Security(Online Chapter) -- Chapter 52 Storage Area Networking Security Devices -- Chapter 53 Risk Management -- Part VII Physical Security -- Chapter 54 Physical Security Essentials -- Chapter 55 Disaster Recovery -- Chapter 56 Biometrics -- Chapter 57 Homeland Security(Online Chapter) -- Chapter 58 Cyber Warfare {u2013}Part VIII Practical Security -- Chapter 59 System Security -- Chapter 60 Securing the Infrastructure -- Chapter 61 Access Controls -- Chapter 62 Assessments and Audits {u2013}Chapter 63 Fundamentals of Cryptography -- Part IX Advanced Security --Chapter 64 Security Through Diversity -- Chapter 65 Online e-Reputation Management Services -- Chapter 66 Content Filtering -- Chapter 67 Data Loss Protection -- Chapter 68 Satellite Cyber Attack Search and Destroy -- Chapter 69 Verifiable Voting Systems -- Chapter 70 Advanced Data Encryption.
504 _aIncludes bibliographical references and index.
650 0 _aComputer networks
_xSecurity measures.
_9174138
650 0 _aPenetration testing (Computer security)
_9174139
700 1 _aVacca, John R.
_9174140
852 1 _9P129.95usd
907 _a39658
_b12-12-13
_c12-08-13
942 _cREF
_00
998 _aref
_b12-08-13
_cm
_da
_en
_feng
_gne
_h0
945 _g0
_i5101631
_j0
_lref
_o-
_p478.00
_q-
_r-
_s-
_t2
_u0
_v0
_w0
_x0
_yi15632234
_z12-08-13
999 _c39658
_d39658