Cargando…

Computer and information security handbook /

This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Morgan Kaufmann Publishers, [2017]
©2017
Edición:Third edition.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn987775933
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 170520s2017 mau obf 001 0 eng d
010 |a  2016952601 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d N$T  |d ESU  |d UIU  |d N$T  |d OPELS  |d TEFOD  |d UMI  |d OCLCF  |d MERER  |d OCLCQ  |d VT2  |d OCLCO  |d LND  |d D6H  |d OCLCQ  |d UAB  |d U3W  |d OCLCQ  |d CEF  |d KSU  |d OCLCQ  |d OCLCA  |d WYU  |d OCLCQ  |d OTZ  |d OCLCQ  |d OCLCA  |d OCLCQ  |d S2H  |d OCLCO  |d COM  |d OCLCO  |d OCL  |d OCLCQ  |d SFB  |d OCLCO  |d OCLCL  |d OCLCQ 
019 |a 987342549  |a 987428032  |a 987706286  |a 988838892  |a 1005907429  |a 1006306047  |a 1008952632  |a 1011024845  |a 1066679189  |a 1235824426  |a 1294651753 
020 |a 9780128039298  |q (electronic bk.) 
020 |a 0128039299  |q (electronic bk.) 
020 |z 0128038438 
020 |z 9780128038437 
024 3 |a 9780128039298 
029 1 |a AU@  |b 000060649931 
029 1 |a AU@  |b 000065280806 
029 1 |a AU@  |b 000066136287 
029 1 |a CHBIS  |b 011069437 
029 1 |a CHNEW  |b 001014282 
029 1 |a CHVBK  |b 499787137 
029 1 |a GBVCP  |b 1004856601 
029 1 |a GBVCP  |b 88989177X 
029 1 |a GBVCP  |b 890400938 
029 1 |a AU@  |b 000067075582 
029 1 |a AU@  |b 000068857159 
029 1 |a AU@  |b 000070618895 
035 |a (OCoLC)987775933  |z (OCoLC)987342549  |z (OCoLC)987428032  |z (OCoLC)987706286  |z (OCoLC)988838892  |z (OCoLC)1005907429  |z (OCoLC)1006306047  |z (OCoLC)1008952632  |z (OCoLC)1011024845  |z (OCoLC)1066679189  |z (OCoLC)1235824426  |z (OCoLC)1294651753 
037 |a 35BAD32D-2AF5-4FC1-804F-A5449B167F14  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b C627 2017 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Computer and information security handbook /  |c edited by John R. Vacca. 
250 |a Third edition. 
260 |a Cambridge, MA :  |b Morgan Kaufmann Publishers,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource, title from PDF title page (EBSCO, viewed June 4, 2017). 
505 0 |a Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security. 
505 8 |a Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security. 
505 8 |a Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE. 
505 8 |a The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems. 
505 8 |a Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION? 
520 |a This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--  |c Adapted from publisher's description. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Rechnernetz  |2 gnd 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Datensicherung  |2 gnd 
650 7 |a Informationssystem  |2 gnd 
650 7 |a Datenschutz  |2 gnd 
655 0 |a Electronic books. 
655 2 |a Handbook 
655 7 |a handbooks.  |2 aat 
655 7 |a Handbooks and manuals  |2 fast 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
700 1 |a Vacca, John R.,  |e editor. 
758 |i has work:  |a Computer and information security handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH9qRGy3B6CxWfqT8HHMrm  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Computer and information security handbook.  |b Third edition.  |d Cambridge, MA : Morgan Kaufmann Publishers, [2017]  |z 9780128038437  |z 0128038438  |w (OCoLC)966205097 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4858374  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128039298/?ar  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4858374 
938 |a EBSCOhost  |b EBSC  |n 1169340 
938 |a YBP Library Services  |b YANK  |n 14431696 
994 |a 92  |b IZTAP