Computer and information security handbook /
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge, MA :
Morgan Kaufmann Publishers,
[2017]
©2017 |
Edición: | Third edition. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn987775933 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 170520s2017 mau obf 001 0 eng d | ||
010 | |a 2016952601 | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDX |d N$T |d ESU |d UIU |d N$T |d OPELS |d TEFOD |d UMI |d OCLCF |d MERER |d OCLCQ |d VT2 |d OCLCO |d LND |d D6H |d OCLCQ |d UAB |d U3W |d OCLCQ |d CEF |d KSU |d OCLCQ |d OCLCA |d WYU |d OCLCQ |d OTZ |d OCLCQ |d OCLCA |d OCLCQ |d S2H |d OCLCO |d COM |d OCLCO |d OCL |d OCLCQ |d SFB |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 987342549 |a 987428032 |a 987706286 |a 988838892 |a 1005907429 |a 1006306047 |a 1008952632 |a 1011024845 |a 1066679189 |a 1235824426 |a 1294651753 | ||
020 | |a 9780128039298 |q (electronic bk.) | ||
020 | |a 0128039299 |q (electronic bk.) | ||
020 | |z 0128038438 | ||
020 | |z 9780128038437 | ||
024 | 3 | |a 9780128039298 | |
029 | 1 | |a AU@ |b 000060649931 | |
029 | 1 | |a AU@ |b 000065280806 | |
029 | 1 | |a AU@ |b 000066136287 | |
029 | 1 | |a CHBIS |b 011069437 | |
029 | 1 | |a CHNEW |b 001014282 | |
029 | 1 | |a CHVBK |b 499787137 | |
029 | 1 | |a GBVCP |b 1004856601 | |
029 | 1 | |a GBVCP |b 88989177X | |
029 | 1 | |a GBVCP |b 890400938 | |
029 | 1 | |a AU@ |b 000067075582 | |
029 | 1 | |a AU@ |b 000068857159 | |
029 | 1 | |a AU@ |b 000070618895 | |
035 | |a (OCoLC)987775933 |z (OCoLC)987342549 |z (OCoLC)987428032 |z (OCoLC)987706286 |z (OCoLC)988838892 |z (OCoLC)1005907429 |z (OCoLC)1006306047 |z (OCoLC)1008952632 |z (OCoLC)1011024845 |z (OCoLC)1066679189 |z (OCoLC)1235824426 |z (OCoLC)1294651753 | ||
037 | |a 35BAD32D-2AF5-4FC1-804F-A5449B167F14 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b C627 2017 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
245 | 0 | 0 | |a Computer and information security handbook / |c edited by John R. Vacca. |
250 | |a Third edition. | ||
260 | |a Cambridge, MA : |b Morgan Kaufmann Publishers, |c [2017] | ||
264 | 4 | |c ©2017 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Online resource, title from PDF title page (EBSCO, viewed June 4, 2017). | |
505 | 0 | |a Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security. | |
505 | 8 | |a Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security. | |
505 | 8 | |a Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE. | |
505 | 8 | |a The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems. | |
505 | 8 | |a Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION? | |
520 | |a This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- |c Adapted from publisher's description. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Rechnernetz |2 gnd | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Datensicherung |2 gnd | |
650 | 7 | |a Informationssystem |2 gnd | |
650 | 7 | |a Datenschutz |2 gnd | |
655 | 0 | |a Electronic books. | |
655 | 2 | |a Handbook | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
700 | 1 | |a Vacca, John R., |e editor. | |
758 | |i has work: |a Computer and information security handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH9qRGy3B6CxWfqT8HHMrm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Computer and information security handbook. |b Third edition. |d Cambridge, MA : Morgan Kaufmann Publishers, [2017] |z 9780128038437 |z 0128038438 |w (OCoLC)966205097 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4858374 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780128039298/?ar |z Texto completo |
938 | |a ProQuest Ebook Central |b EBLB |n EBL4858374 | ||
938 | |a EBSCOhost |b EBSC |n 1169340 | ||
938 | |a YBP Library Services |b YANK |n 14431696 | ||
994 | |a 92 |b IZTAP |