Cargando…

Computer security handbook.

The classic and authoritative reference in the field of computer security, now completely updated and revised. With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bosworth, Seymour, Kabay, Michel E., Whyne, Eric, 1981-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley & Sons, ©2009.
Edición:5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn440646866
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 090805s2009 njua ob 001 0 eng d
040 |a YUS  |b eng  |e pn  |c YUS  |d OCLCQ  |d B24X7  |d N$T  |d OCLCQ  |d YDXCP  |d UMI  |d DEBSZ  |d AU@  |d OCLCF  |d OCLCQ  |d COO  |d OCLCO  |d LIV  |d OCLCQ  |d CEF  |d OCLCQ  |d INARC  |d OCLCO  |d IEEEE  |d OCLCQ  |d OCLCO 
019 |a 811500586  |a 827738881  |a 880753457  |a 889366298  |a 1058744938  |a 1144932034 
020 |a 9780470413746  |q (electronic bk.) 
020 |a 0470413743  |q (electronic bk.) 
020 |a 0471716529 
020 |a 9780471716525 
020 |a 9781119706724  |q (electronic bk.) 
020 |a 1119706726  |q (electronic bk.) 
020 |a 9781119706762  |q (electronic bk.) 
020 |a 1119706769  |q (electronic bk.) 
020 |a 9781119706748  |q (electronic bk.) 
020 |a 1119706742  |q (electronic bk.) 
020 |z 9780470327227 
020 |z 0470327227 
020 |z 9780470327234 
020 |z 0470327235 
024 3 |a 9780471716525 
024 7 |a 10.1002/9781119706762  |2 doi 
029 1 |a AU@  |b 000050590920 
029 1 |a AU@  |b 000052900545 
029 1 |a AU@  |b 000053316210 
029 1 |a AU@  |b 000053319560 
029 1 |a AU@  |b 000060064069 
029 1 |a DEBBG  |b BV041120079 
029 1 |a DEBSZ  |b 396679676 
029 1 |a GBVCP  |b 785366598 
029 1 |a NZ1  |b 15411759 
035 |a (OCoLC)440646866  |z (OCoLC)811500586  |z (OCoLC)827738881  |z (OCoLC)880753457  |z (OCoLC)889366298  |z (OCoLC)1058744938  |z (OCoLC)1144932034 
037 |a CL0500000192  |b Safari Books Online 
037 |a 9820894  |b IEEE 
050 4 |a QA76.9.A25  |b C64 2009eb 
050 4 |a HF5548.37  |b .C64 2009eb 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
072 7 |a BUS  |x 097000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 22 
049 |a UAMI 
245 0 0 |a Computer security handbook. 
250 |a 5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne. 
260 |a Hoboken, N.J. :  |b John Wiley & Sons,  |c ©2009. 
300 |a 1 online resource (2 volumes) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Brief history and mission of information system security / Seymour Bosworth and Robert V. Jacobson -- History of computer crime / M.E. Kabay -- Toward a new framework for information security / Donn B. Parker -- Hardware elements of security / Seymour Bosworth and Stephen Cobb -- Data communications and information security / Raymond Panko -- Network topologies, protocols, and design / Gary C. Kessler and N. Todd Pritsky -- Encryption / Stephen Cobb and Corinne Lefrancois -- Using a common language for computer security incident information / John D. Howard -- Mathematical models of computer security / Matt Bishop -- Understanding studies and surveys of computer crime / M.E. Kabay -- Fundamentals of intellectual property law / William A. Zucker and Scott J. Nathan. 
505 8 |a Psychology of computer criminals / Q. Campbell and David M. Kennedy -- Dangerous information technology insider: psychological characteristics and career patterns / Jerrold M. Post -- Information warfare / Seymour Bosworth -- Penetrating computer systems and networks / Chey Cobb, Stephen Cobb, and M.E. Kabay -- Malicious code / Robert Guess and Eric Salveggio -- Mobile code / Robert Gezelter -- Denial-of-service attacks / Gary C. Kessler and Diane E. Levine -- Social engineering and low-tech attacks / Karthik Raman ... [and three others] -- Spam, phishing, and Trojans: attacks meant to fool / Stephen Cobb -- Web-based vulnerabilities / Anup K. Ghosh ... [and three others] -- Physical threats to the information infrastructure / Franklin Platt. 
505 8 |a Protecting the information infrastructure / Franklin Platt -- Operating system security / William Stallings -- Local area networks / Gary C. Kessler and N. Todd Pritsky -- Gateway security devices / David Brussin and Justin Opatrny -- Intrusion detection and intrusion prevention devices / Rebecca Gurley Bace -- Identification and authentication / Ravi Sandhu ... [and three others] -- Biometric authentication / David R. Lease ... [and three others] -- E-commerce and Web server safeguards / Robert Gezelter -- Web monitoring and content filtering / Steven Lovaas -- Virtual private networks and secure remote access / Justin Opatrny -- 802.11 wireless LAN security / Gary L. Tagg -- Securing VoIP / Christopher Dantos and John Mason -- Securing P2P, IM, SMS, and collaboration tools / Carl Ness -- Securing stored data / David J. Johnson, Nicholas Takacs, and Jennifer Hadley -- PKI and certificate authorities / Santosh Chokhani, Padgett Peterson, and Steven Lovaas -- Writing secure code / Lester E. Nichols, M.E. Kabay, and Timothy Braithwaite -- Software development and quality assurance / John Mason, Jennifer Hadley, and Diane E. Levine -- Managing software patches and vulnerabilities / Peter Mell and Karen Kent -- Antivirus technology / Chey Cobb and Allysa Myers -- Protecting digital rights: technical approaches / Robert Guess ... [and three others]. 
505 8 |a Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines / M.E. Kabay and Bridgitt Robertson -- Employment practices and policies / M.E. Kabay and Bridgitt Robertson -- Vulnerability assessment / Rebecca Gurley Bace -- Operations security and production controls / M.E. Kabay, Don Holden, and Myles Walsh -- E-mail and Internet use policies / M.E. Kabay and Nicholas Takacs -- Implementing a security awareness program / K. Rudolph -- Using social psychology to implement security policies / M.E. Kabay ... [and three others] -- Security standards for products / Paul J. Brusil and Noel Zakin. 
505 8 |a Application controls / Myles Walsh -- Monitoring and control systems / Caleb S. Coggins and Diane E. Levine -- Security audits, standards, and inspections / Donald Glass ... [and six others] -- Cyber investigation / Peter Stephenson. 
505 8 |a Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data backups and archives / M.E. Kabay and Don Holden -- Business continuity planning / Michael Miora -- Disaster recovery / Michael Miora -- Insurance relief / Robert A. Parisi Jr., Chaim Haas, and Nancy Callahan -- Working with law enforcement / David A. Land. 
505 8 |a Risk assessment and risk management / Robert V. Jacobson -- Management responsibilities and liabilities / Carl Hallberg ... [and three others] -- U.S. legal and regulatory security issues / Timothy Virtue -- Role of the CISO / Karen F. Worstell -- Developing security policies / M.E. Kabay and Sean Kelley -- Developing classification policies for data / Karthik Raman and Kevin Beets -- Outsourcing and security / Kip Boyle, Michael Buglewicz, and Steven Lovaas. 
505 8 |a Privacy in cyberspace: U.S. and European perspectives / Marc Rotenberg -- Anonymity and identity in cyberspace / M.E. Kabay, Eric Salveggio, and Robert Guess -- Medical records protection / Paul J. Brusil -- Legal and policy issues of censorship and content filtering / Lee Tien, Seth Finkelstein, and Steven Lovaas -- Expert witnesses and the Daubert challenge / Chey Cobb -- Professional certification and training in information assurance / Christopher Christian ... [and three others] -- Undergraduate and graduate education in information assurance / Vic Maconachy, John Orlando, and Seymour Bosworth -- European graduate work in information assurance and the Bologna Declaration / Urs E. Gattiker -- Future of information assurance / Peter G. Neumann. 
520 |a The classic and authoritative reference in the field of computer security, now completely updated and revised. With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Electronic data processing departments  |x Security measures. 
650 6 |a Centres de traitement de l'information  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a Electronic data processing departments  |x Security measures  |2 fast 
700 1 |a Bosworth, Seymour. 
700 1 |a Kabay, Michel E. 
700 1 |a Whyne, Eric,  |d 1981- 
776 0 8 |i Print version:  |t Computer security handbook.  |b 5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne.  |d Hoboken, N.J. : John Wiley & Sons, ©2009  |z 9780471716525  |w (DLC) 2008040626  |w (OCoLC)148798026 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780471716525/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00029816 
938 |a EBSCOhost  |b EBSC  |n 470648 
938 |a Internet Archive  |b INAR  |n computersecurity0001unse 
938 |a Internet Archive  |b INAR  |n computersecurity0002unse 
938 |a Internet Archive  |b INAR  |n computersecurity0001unse_v3d1 
938 |a YBP Library Services  |b YANK  |n 9449600 
994 |a 92  |b IZTAP