Cargando…

Computer and information security handbook /

The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn846496151
003 OCoLC
005 20231117044900.0
006 m o d
007 cr cnu---unuuu
008 130603s2013 ne ob 001 0 eng d
010 |z  2013020996 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OPELS  |d VRC  |d UIU  |d E7B  |d OCLCF  |d CDX  |d UPM  |d GGVRL  |d OCLCQ  |d UIU  |d DEBSZ  |d CREDO  |d OCLCQ  |d YDX  |d ICA  |d CCO  |d MERUC  |d LOA  |d AGLDB  |d K6U  |d STF  |d Z5A  |d PIFAG  |d FVL  |d ZCU  |d LIV  |d SAV  |d OCLCQ  |d U3W  |d DEBBG  |d D6H  |d WRM  |d MNI  |d VTS  |d ICG  |d NLE  |d INT  |d VT2  |d COO  |d UKMGB  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d LEAUB  |d DKC  |d OCLCQ  |d OL$  |d AU@  |d OCLCQ  |d OCLCO  |d QGK  |d COA  |d OCLCQ  |d OCLCO 
015 |a GBB6I9475  |2 bnb 
016 7 |a 017596556  |2 Uk 
016 7 |a 017990617  |2 Uk 
019 |a 869488772  |a 958854838  |a 959423127  |a 962116414  |a 1044834703  |a 1055362555  |a 1065752432  |a 1081200766  |a 1087057895  |a 1097089326  |a 1103272609  |a 1129354603  |a 1153023486  |a 1193127432  |a 1228617446  |a 1240534015  |a 1259173725  |a 1340058490 
020 |a 9780123946126  |q (electronic bk.) 
020 |a 0123946123  |q (electronic bk.) 
020 |a 9781784023447 
020 |a 1784023442 
020 |z 9780123943972 
020 |z 0123943973 
024 8 |a (WaSeSS)ssj0000885463 
035 |a (OCoLC)846496151  |z (OCoLC)869488772  |z (OCoLC)958854838  |z (OCoLC)959423127  |z (OCoLC)962116414  |z (OCoLC)1044834703  |z (OCoLC)1055362555  |z (OCoLC)1065752432  |z (OCoLC)1081200766  |z (OCoLC)1087057895  |z (OCoLC)1097089326  |z (OCoLC)1103272609  |z (OCoLC)1129354603  |z (OCoLC)1153023486  |z (OCoLC)1193127432  |z (OCoLC)1228617446  |z (OCoLC)1240534015  |z (OCoLC)1259173725  |z (OCoLC)1340058490 
050 4 |a QA76.9.A25  |b C627 2013eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Computer and information security handbook /  |c edited by John R. Vacca. 
250 |a 2nd ed. 
260 |a Amsterdam :  |b Morgan Kaufmann Publishers is an imprint of Elsevier,  |c [2013] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions. 
505 0 |a Part I: Overview of system and network security : a comprehensive introduction -- Building a secure organization / John Mallery -- A cryptography primer / Scott R. Ellis -- Detecting system intrusions / Almantas Kakareka -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Thomas M. Chen, Patrick J. Walsh -- Securing cloud computing systems / Cem Gurkok -- Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- Securing web applications, services, and servers / Gerald Beuchelt -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operaing systems / Mario Santana -- Internet security / Jesse Walker -- The Botnet problem / Daniel Ramsbrock, Xinyuan Wang -- Intranet security / Bill Mansoor -- Local area network security / Dr. Pramod Pandya -- Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan [and others] -- Wireless sensor network security / Harsh Kupwade Patil, Thomas M. Chen -- Cellular network security / Penh Liu, Thomas F. La Porta, Kameswari Kotapati -- RFID security / Chunming Rong, Gansen Zhao, Liang Yan [and others] -- Optical network security / Lauren Collins -- Optical wireless security / Scott R. Ellis -- Part II: Managing information security -- Information security essentials for IT managers : protecting mission-critical systems / Albert Caballero -- Security management systems / James T. Harmening -- Policy-driven system management / Henrik Plate, Cataldo Bsile, Stefano Paraboschi -- Information technology security management / Rahul Bhaskar, Bhushan Kapoor -- Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- Intrusion prevention and detection systems / Christopher Day -- TCP/IP packet analysis / Pramod Pandya -- The enemy (the intruder's genesis) / Dr. Pramad Pandya -- Firewalls (online chpater) / Dr. Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Security metrics : an introduction and literature review / George O.M. Yee -- Part III: Cyber, network, and systems forensics security and assurance -- Cyber forensics / Scott R. Ellis -- Cyber forensics and incident response / Cem Gurkok -- Securing e-discovery / Scott R. Ellis -- Network forensics / Yong Guan -- Part IV: Encryption technology -- Data encryption / Dr. Bhushan Kapoor, Dr. Pramad Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure (online chapter) / Terence Spies -- Password-based authenticated key establishment protocols / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan [and others] -- Instant-messaging security / Samuel J.J. Curry -- Part V: Privacy and access management -- Privacy on the internet / Marco Cremonini, Chiara Braghin, Claudio Agostino Ardagna -- Privacy-enhancing technologies / Simone Fischer-Hbner, Stefan Berthold -- Personal privacy policies / George O.M. Yee, Larry Korba -- Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti .[et al.] -- Supporting user privacy prefences in digital interactions / Sara Foresti, Pierangela Samarati -- Privacy and security in environmental monitoring systems : issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livragi [and others] -- Virtual private networks / James T. Harmening -- Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- VoIP security / Harsh Kupwade Patil, Dan Wing, Thomas M. Chen -- Part VI: Storage security -- SAN security (online chapter) / John McGowan, Jeffrey Bardin, John McDonald -- Storage area networking security devices / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Part VII: Physical security -- Physical security essentials / William Stallings -- Disaster recovery / Scott R. Ellis, Lauren Collins -- Biometrics / Luther Martin -- Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- Cyber warfare / Anna Granova, Marco Slaviero -- Part VIII: Pracical security -- System security / Lauren Collins -- Securing the infrastructure / Lauren Collins -- Access controls / Lauren Collins -- Assessments and audits / Lauren Collins -- Fundamentals of cryptography / Scott R. Ellis -- Part IX: Advanced security -- Security through diversity / Kevin Noble -- Online e-reputation management services / Jean-Marc Seigneur -- Content filtering (online chapter) / Pete Nicoletti -- Data loss protection / Ken Perkins -- Satellite cyber attack search and destroy / Jeffrey Bardin -- Verifiable voting systems / Thea Peacock, Peter Y.A. Ryan, Steve Schneider [and others] -- Advanced data encryption / Pramad Pandya -- Online chapters -- Firewalls / Dr. Errin W. Fulp -- Public key infrastructure / Terence Spies -- Identit theft / Markus Jakobsson, Alex Tsow -- SAN security / John McGowan, Jeffrey Bardin, John McDonald -- Homeland security / Rahul Bhaskar, Bhushan Kapoor -- Content filtering / Pete Nicoletti. 
546 |a English. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Tests d'intrusion.  |0 (CaQQLa)000274128 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a Datan�at  |x s�akerhetsaspekter.  |2 sao 
650 7 |a Datas�akerhet.  |2 sao 
650 7 |a Datorn�atverk  |x s�akerhetsaspekter.  |2 sao 
650 7 |a Datorer  |x s�akerhetsaspekter.  |2 sao 
650 7 |a Dators�akerhet.  |2 sao 
650 7 |a IT-s�akerhet.  |2 sao 
700 1 |a Vacca, John R. 
776 0 8 |i Print version:  |t Computer and information security handbook.  |b 2nd ed.  |d Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]  |z 9780123943972  |w (DLC) 2013020996  |w (OCoLC)845350155 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780123943972  |z Texto completo