Cargando…

Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bidgoli, Hossein
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Preface
  • Guide to The Handbook of Information Security
  • Internal Security Threats
  • Physical Security Threats
  • Fixed-Line Telephone System Vulnerabilities
  • E-Mail Threats and Vulnerabilities
  • E-Commerce Vulnerabilities
  • Hacking Techniques in Wired Networks Hacking
  • Hacking Techniques in Wireless Networks
  • Computer Viruses and Worms
  • Trojan Horse Programs
  • Hoax Viruses and Virus Alerts
  • Hostile Java Applets
  • Spyware
  • Mobile Code and Security
  • Wireless Threats and Attacks
  • WEP Security
  • Bluetooth Security
  • Cracking WEP
  • Denial of Service Attacks
  • Network Attacks
  • Fault Attacks
  • Side-Channel Attacks
  • Physical Security Measures
  • RFID and Security
  • Cryptographic Privacy Protection Techniques
  • Cryptographic Hardware Security Modules
  • Smart Card Security
  • Client-Side Security
  • Server-Side Security
  • Protecting Web Sites
  • Database Security
  • Medical Records Security
  • Access Control: Principles and Solutions
  • Password Authentication
  • Computer and Network Authentication
  • Antivirus Technology
  • Biometric Basics and Biometric Authentication
  • Issues and Concerns in Biometric IT Security
  • Firewall Basics
  • Firewall Architectures
  • Packet Filtering and Stateful Firewalls
  • Proxy Firewalls
  • E-Commerce Safeguards
  • Digital Signatures and Electronic Signatures
  • E-Mail Security
  • Security for ATM Networks
  • VPN Basics
  • VPN Architecture
  • IP-Based VPN
  • Identity Management
  • The Use of Deception Techniques: Honeypots and Decoys
  • Active Response to Computer Intrusions
  • Intrusion Detection Systems Basics
  • Host-Based Intrusion Detection Systems
  • Network-Based Intrusion Detection Systems
  • The Use of Agent Technology for Intrusion Detection
  • Contingency Planning Management
  • Computer Security Incident Response Teams (CSIRTs)
  • Implementing a Security Awareness Program
  • Risk Management for IT Security
  • Security Insurance and Best Practices
  • Auditing Information Systems Security
  • Evidence Collection and Analysis Tools
  • Information Leakage: Detection and Countermeasures
  • Digital Rights Management
  • Web Hosting
  • Managing a Network Environment
  • E-Mail and Internet Use Policies
  • Forward Security Adaptive Cryptography: Time Evolution
  • Security Policy Guidelines
  • Asset- Security Goals Continuum: A Process for Security
  • Multilevel Security
  • Multilevel Security Models
  • Security Architectures
  • Quality of Security Service: Adaptive Security
  • Security Policy Enforcement
  • Guidelines for a Comprehensive Security System.