Cargando…

Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bidgoli, Hossein
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn271872721
003 OCoLC
005 20231017213018.0
006 m go d
007 cr mnu---uuuuu
008 080911s2006 njua ob 001 0 eng d
040 |a AU@  |b eng  |e pn  |c AU@  |d OCLCQ  |d E7B  |d N$T  |d OCLCQ  |d OCLCF  |d IDEBK  |d UMI  |d DEBBG  |d OCLCQ  |d COO  |d OCLCQ  |d CEF  |d VT2  |d UAB  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ 
019 |a 647809591  |a 814385666  |a 878852635  |a 1044331446  |a 1056425423  |a 1058906229  |a 1060907920  |a 1103256662  |a 1129359795  |a 1153037600 
020 |a 9780470051214  |q (electronic bk.) 
020 |a 0470051213  |q (electronic bk.) 
020 |a 1280409088 
020 |a 9781280409080 
020 |z 0471648329 
020 |z 9780471648321 
029 0 |a AU@  |b 000043398589 
029 1 |a AU@  |b 000067095193 
029 1 |a DEBBG  |b BV042031672 
029 1 |a DEBSZ  |b 414171284 
029 1 |a GBVCP  |b 802712487 
035 |a (OCoLC)271872721  |z (OCoLC)647809591  |z (OCoLC)814385666  |z (OCoLC)878852635  |z (OCoLC)1044331446  |z (OCoLC)1056425423  |z (OCoLC)1058906229  |z (OCoLC)1060907920  |z (OCoLC)1103256662  |z (OCoLC)1129359795  |z (OCoLC)1153037600 
037 |a CL0500000421  |b Safari Books Online 
050 4 |a TK5105.59  |b .H353 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a KM  |2 bicssc 
082 0 4 |a 005.8 
049 |a UAMI 
245 0 0 |a Handbook of information security.  |n Volume 3,  |p Threats, vulnerabilities, prevention, detection, and management /  |c Hossein Bidgoli, editor-in-chief. 
246 3 0 |a Threats, vulnerabilities, prevention, detection, and management 
260 |a Hoboken, N.J. :  |b John Wiley,  |c ©2006. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Preface -- Guide to The Handbook of Information Security -- Internal Security Threats -- Physical Security Threats -- Fixed-Line Telephone System Vulnerabilities -- E-Mail Threats and Vulnerabilities -- E-Commerce Vulnerabilities -- Hacking Techniques in Wired Networks Hacking -- Hacking Techniques in Wireless Networks -- Computer Viruses and Worms -- Trojan Horse Programs -- Hoax Viruses and Virus Alerts -- Hostile Java Applets -- Spyware -- Mobile Code and Security -- Wireless Threats and Attacks -- WEP Security -- Bluetooth Security -- Cracking WEP -- Denial of Service Attacks -- Network Attacks -- Fault Attacks -- Side-Channel Attacks -- Physical Security Measures -- RFID and Security -- Cryptographic Privacy Protection Techniques -- Cryptographic Hardware Security Modules -- Smart Card Security -- Client-Side Security -- Server-Side Security -- Protecting Web Sites -- Database Security -- Medical Records Security -- Access Control: Principles and Solutions -- Password Authentication -- Computer and Network Authentication -- Antivirus Technology -- Biometric Basics and Biometric Authentication -- Issues and Concerns in Biometric IT Security -- Firewall Basics -- Firewall Architectures -- Packet Filtering and Stateful Firewalls -- Proxy Firewalls -- E-Commerce Safeguards -- Digital Signatures and Electronic Signatures -- E-Mail Security -- Security for ATM Networks -- VPN Basics -- VPN Architecture -- IP-Based VPN -- Identity Management -- The Use of Deception Techniques: Honeypots and Decoys -- Active Response to Computer Intrusions -- Intrusion Detection Systems Basics -- Host-Based Intrusion Detection Systems -- Network-Based Intrusion Detection Systems -- The Use of Agent Technology for Intrusion Detection -- Contingency Planning Management -- Computer Security Incident Response Teams (CSIRTs) -- Implementing a Security Awareness Program -- Risk Management for IT Security -- Security Insurance and Best Practices -- Auditing Information Systems Security -- Evidence Collection and Analysis Tools -- Information Leakage: Detection and Countermeasures -- Digital Rights Management -- Web Hosting -- Managing a Network Environment -- E-Mail and Internet Use Policies -- Forward Security Adaptive Cryptography: Time Evolution -- Security Policy Guidelines -- Asset- Security Goals Continuum: A Process for Security -- Multilevel Security -- Multilevel Security Models -- Security Architectures -- Quality of Security Service: Adaptive Security -- Security Policy Enforcement -- Guidelines for a Comprehensive Security System. 
588 0 |a Print version record. 
520 |a The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Home computer networks. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux locaux domestiques (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Home computer networks.  |2 fast  |0 (OCoLC)fst00959166 
700 1 |a Bidgoli, Hossein. 
776 0 8 |i Print version:  |t Handbook of information security.  |d Hoboken, N.J. : John Wiley, ©2006  |w (DLC) 2005006851 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780471648321/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a EBSCOhost  |b EBSC  |n 151863 
994 |a 92  |b IZTAP