|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn846496151 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130603s2013 ne ob 001 0 eng d |
010 |
|
|
|z 2013020996
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OPELS
|d VRC
|d UIU
|d E7B
|d OCLCF
|d CDX
|d UPM
|d GGVRL
|d OCLCQ
|d UIU
|d DEBSZ
|d CREDO
|d OCLCQ
|d YDX
|d ICA
|d CCO
|d MERUC
|d LOA
|d AGLDB
|d K6U
|d STF
|d Z5A
|d PIFAG
|d FVL
|d ZCU
|d LIV
|d SAV
|d OCLCQ
|d U3W
|d DEBBG
|d D6H
|d WRM
|d MNI
|d VTS
|d ICG
|d NLE
|d INT
|d VT2
|d COO
|d UKMGB
|d OCLCQ
|d WYU
|d TKN
|d OCLCQ
|d LEAUB
|d DKC
|d OCLCQ
|d OL$
|d AU@
|d OCLCQ
|d OCLCO
|d QGK
|d COA
|d OCLCQ
|
015 |
|
|
|a GBB6I9475
|2 bnb
|
016 |
7 |
|
|a 017596556
|2 Uk
|
016 |
7 |
|
|a 017990617
|2 Uk
|
019 |
|
|
|a 869488772
|a 958854838
|a 959423127
|a 962116414
|a 1044834703
|a 1055362555
|a 1065752432
|a 1081200766
|a 1087057895
|a 1097089326
|a 1103272609
|a 1129354603
|a 1153023486
|a 1193127432
|a 1228617446
|a 1240534015
|a 1259173725
|a 1340058490
|
020 |
|
|
|a 9780123946126
|q (electronic bk.)
|
020 |
|
|
|a 0123946123
|q (electronic bk.)
|
020 |
|
|
|a 9781784023447
|
020 |
|
|
|a 1784023442
|
020 |
|
|
|z 9780123943972
|
020 |
|
|
|z 0123943973
|
024 |
8 |
|
|a (WaSeSS)ssj0000885463
|
029 |
1 |
|
|a AU@
|b 000051860171
|
029 |
1 |
|
|a CHNEW
|b 000603961
|
029 |
1 |
|
|a CHNEW
|b 001026503
|
029 |
1 |
|
|a CHVBK
|b 303089547
|
029 |
1 |
|
|a DEBBG
|b BV043960329
|
029 |
1 |
|
|a DEBBG
|b BV044175814
|
029 |
1 |
|
|a DEBSZ
|b 405348908
|
029 |
1 |
|
|a DEBSZ
|b 431424209
|
029 |
1 |
|
|a DEBSZ
|b 481273417
|
029 |
1 |
|
|a NLGGC
|b 358140870
|
029 |
1 |
|
|a NZ1
|b 15193696
|
029 |
1 |
|
|a UKMGB
|b 017596556
|
029 |
1 |
|
|a UKMGB
|b 017990617
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999939041905765
|
035 |
|
|
|a (OCoLC)846496151
|z (OCoLC)869488772
|z (OCoLC)958854838
|z (OCoLC)959423127
|z (OCoLC)962116414
|z (OCoLC)1044834703
|z (OCoLC)1055362555
|z (OCoLC)1065752432
|z (OCoLC)1081200766
|z (OCoLC)1087057895
|z (OCoLC)1097089326
|z (OCoLC)1103272609
|z (OCoLC)1129354603
|z (OCoLC)1153023486
|z (OCoLC)1193127432
|z (OCoLC)1228617446
|z (OCoLC)1240534015
|z (OCoLC)1259173725
|z (OCoLC)1340058490
|
037 |
|
|
|a 9780123946126
|b Ingram Content Group
|
050 |
|
4 |
|a QA76.9.A25
|b C627 2013eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Computer and information security handbook /
|c edited by John R. Vacca.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Amsterdam :
|b Morgan Kaufmann Publishers is an imprint of Elsevier,
|c [2013]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
336 |
|
|
|a still image
|b sti
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions.
|
505 |
0 |
|
|a Part I: Overview of system and network security : a comprehensive introduction -- Building a secure organization / John Mallery -- A cryptography primer / Scott R. Ellis -- Detecting system intrusions / Almantas Kakareka -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Thomas M. Chen, Patrick J. Walsh -- Securing cloud computing systems / Cem Gurkok -- Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- Securing web applications, services, and servers / Gerald Beuchelt -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operaing systems / Mario Santana -- Internet security / Jesse Walker -- The Botnet problem / Daniel Ramsbrock, Xinyuan Wang -- Intranet security / Bill Mansoor -- Local area network security / Dr. Pramod Pandya -- Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan [and others] -- Wireless sensor network security / Harsh Kupwade Patil, Thomas M. Chen -- Cellular network security / Penh Liu, Thomas F. La Porta, Kameswari Kotapati -- RFID security / Chunming Rong, Gansen Zhao, Liang Yan [and others] -- Optical network security / Lauren Collins -- Optical wireless security / Scott R. Ellis -- Part II: Managing information security -- Information security essentials for IT managers : protecting mission-critical systems / Albert Caballero -- Security management systems / James T. Harmening -- Policy-driven system management / Henrik Plate, Cataldo Bsile, Stefano Paraboschi -- Information technology security management / Rahul Bhaskar, Bhushan Kapoor -- Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- Intrusion prevention and detection systems / Christopher Day -- TCP/IP packet analysis / Pramod Pandya -- The enemy (the intruder's genesis) / Dr. Pramad Pandya -- Firewalls (online chpater) / Dr. Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Security metrics : an introduction and literature review / George O.M. Yee -- Part III: Cyber, network, and systems forensics security and assurance -- Cyber forensics / Scott R. Ellis -- Cyber forensics and incident response / Cem Gurkok -- Securing e-discovery / Scott R. Ellis -- Network forensics / Yong Guan -- Part IV: Encryption technology -- Data encryption / Dr. Bhushan Kapoor, Dr. Pramad Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure (online chapter) / Terence Spies -- Password-based authenticated key establishment protocols / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan [and others] -- Instant-messaging security / Samuel J.J. Curry -- Part V: Privacy and access management -- Privacy on the internet / Marco Cremonini, Chiara Braghin, Claudio Agostino Ardagna -- Privacy-enhancing technologies / Simone Fischer-Hbner, Stefan Berthold -- Personal privacy policies / George O.M. Yee, Larry Korba -- Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti .[et al.] -- Supporting user privacy prefences in digital interactions / Sara Foresti, Pierangela Samarati -- Privacy and security in environmental monitoring systems : issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livragi [and others] -- Virtual private networks / James T. Harmening -- Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- VoIP security / Harsh Kupwade Patil, Dan Wing, Thomas M. Chen -- Part VI: Storage security -- SAN security (online chapter) / John McGowan, Jeffrey Bardin, John McDonald -- Storage area networking security devices / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Part VII: Physical security -- Physical security essentials / William Stallings -- Disaster recovery / Scott R. Ellis, Lauren Collins -- Biometrics / Luther Martin -- Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- Cyber warfare / Anna Granova, Marco Slaviero -- Part VIII: Pracical security -- System security / Lauren Collins -- Securing the infrastructure / Lauren Collins -- Access controls / Lauren Collins -- Assessments and audits / Lauren Collins -- Fundamentals of cryptography / Scott R. Ellis -- Part IX: Advanced security -- Security through diversity / Kevin Noble -- Online e-reputation management services / Jean-Marc Seigneur -- Content filtering (online chapter) / Pete Nicoletti -- Data loss protection / Ken Perkins -- Satellite cyber attack search and destroy / Jeffrey Bardin -- Verifiable voting systems / Thea Peacock, Peter Y.A. Ryan, Steve Schneider [and others] -- Advanced data encryption / Pramad Pandya -- Online chapters -- Firewalls / Dr. Errin W. Fulp -- Public key infrastructure / Terence Spies -- Identit theft / Markus Jakobsson, Alex Tsow -- SAN security / John McGowan, Jeffrey Bardin, John McDonald -- Homeland security / Rahul Bhaskar, Bhushan Kapoor -- Content filtering / Pete Nicoletti.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
650 |
|
7 |
|a Datanät
|x säkerhetsaspekter.
|2 sao
|
650 |
|
7 |
|a Datasäkerhet.
|2 sao
|
650 |
|
7 |
|a Datornätverk
|x säkerhetsaspekter.
|2 sao
|
650 |
|
7 |
|a Datorer
|x säkerhetsaspekter.
|2 sao
|
650 |
|
7 |
|a Datorsäkerhet.
|2 sao
|
650 |
|
7 |
|a IT-säkerhet.
|2 sao
|
700 |
1 |
|
|a Vacca, John R.
|
776 |
0 |
8 |
|i Print version:
|t Computer and information security handbook.
|b 2nd ed.
|d Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]
|z 9780123943972
|w (DLC) 2013020996
|w (OCoLC)845350155
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=485997
|z Texto completo
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 25592318
|
938 |
|
|
|a Credo Reference
|b CRED
|n 9781784023447
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10714580
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 485997
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8EBC
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10745427
|
994 |
|
|
|a 92
|b IZTAP
|