Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management /
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
John Wiley,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Preface
- Guide to The Handbook of Information Security
- Internal Security Threats
- Physical Security Threats
- Fixed-Line Telephone System Vulnerabilities
- E-Mail Threats and Vulnerabilities
- E-Commerce Vulnerabilities
- Hacking Techniques in Wired Networks Hacking
- Hacking Techniques in Wireless Networks
- Computer Viruses and Worms
- Trojan Horse Programs
- Hoax Viruses and Virus Alerts
- Hostile Java Applets
- Spyware
- Mobile Code and Security
- Wireless Threats and Attacks
- WEP Security
- Bluetooth Security
- Cracking WEP
- Denial of Service Attacks
- Network Attacks
- Fault Attacks
- Side-Channel Attacks
- Physical Security Measures
- RFID and Security
- Cryptographic Privacy Protection Techniques
- Cryptographic Hardware Security Modules
- Smart Card Security
- Client-Side Security
- Server-Side Security
- Protecting Web Sites
- Database Security
- Medical Records Security
- Access Control: Principles and Solutions
- Password Authentication
- Computer and Network Authentication
- Antivirus Technology
- Biometric Basics and Biometric Authentication
- Issues and Concerns in Biometric IT Security
- Firewall Basics
- Firewall Architectures
- Packet Filtering and Stateful Firewalls
- Proxy Firewalls
- E-Commerce Safeguards
- Digital Signatures and Electronic Signatures
- E-Mail Security
- Security for ATM Networks
- VPN Basics
- VPN Architecture
- IP-Based VPN
- Identity Management
- The Use of Deception Techniques: Honeypots and Decoys
- Active Response to Computer Intrusions
- Intrusion Detection Systems Basics
- Host-Based Intrusion Detection Systems
- Network-Based Intrusion Detection Systems
- The Use of Agent Technology for Intrusion Detection
- Contingency Planning Management
- Computer Security Incident Response Teams (CSIRTs)
- Implementing a Security Awareness Program
- Risk Management for IT Security
- Security Insurance and Best Practices
- Auditing Information Systems Security
- Evidence Collection and Analysis Tools
- Information Leakage: Detection and Countermeasures
- Digital Rights Management
- Web Hosting
- Managing a Network Environment
- E-Mail and Internet Use Policies
- Forward Security Adaptive Cryptography: Time Evolution
- Security Policy Guidelines
- Asset- Security Goals Continuum: A Process for Security
- Multilevel Security
- Multilevel Security Models
- Security Architectures
- Quality of Security Service: Adaptive Security
- Security Policy Enforcement
- Guidelines for a Comprehensive Security System.