Computer and information security handbook /
The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice a...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam :
Morgan Kaufmann Publishers is an imprint of Elsevier,
[2013]
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Part I: Overview of system and network security : a comprehensive introduction
- Building a secure organization / John Mallery
- A cryptography primer / Scott R. Ellis
- Detecting system intrusions / Almantas Kakareka
- Preventing system intrusions / Michael West
- Guarding against network intrusions / Thomas M. Chen, Patrick J. Walsh
- Securing cloud computing systems / Cem Gurkok
- Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri
- Securing web applications, services, and servers / Gerald Beuchelt
- Unix and Linux security / Gerald Beuchelt
- Eliminating the security weakness of Linux and Unix operaing systems / Mario Santana
- Internet security / Jesse Walker
- The Botnet problem / Daniel Ramsbrock, Xinyuan Wang
- Intranet security / Bill Mansoor
- Local area network security / Dr. Pramod Pandya
- Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan [and others]
- Wireless sensor network security / Harsh Kupwade Patil, Thomas M. Chen
- Cellular network security / Penh Liu, Thomas F. La Porta, Kameswari Kotapati
- RFID security / Chunming Rong, Gansen Zhao, Liang Yan [and others]
- Optical network security / Lauren Collins
- Optical wireless security / Scott R. Ellis
- Part II: Managing information security
- Information security essentials for IT managers : protecting mission-critical systems / Albert Caballero
- Security management systems / James T. Harmening
- Policy-driven system management / Henrik Plate, Cataldo Bsile, Stefano Paraboschi
- Information technology security management / Rahul Bhaskar, Bhushan Kapoor
- Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur
- Intrusion prevention and detection systems / Christopher Day
- TCP/IP packet analysis / Pramod Pandya
- The enemy (the intruder's genesis) / Dr. Pramad Pandya
- Firewalls (online chpater) / Dr. Errin W. Fulp
- Penetration testing / Sanjay Bavisi
- What is vulnerability assessment? / Almantas Kakareka
- Security metrics : an introduction and literature review / George O.M. Yee
- Part III: Cyber, network, and systems forensics security and assurance
- Cyber forensics / Scott R. Ellis
- Cyber forensics and incident response / Cem Gurkok
- Securing e-discovery / Scott R. Ellis
- Network forensics / Yong Guan
- Part IV: Encryption technology
- Data encryption / Dr. Bhushan Kapoor, Dr. Pramad Pandya
- Satellite encryption / Daniel S. Soper
- Public key infrastructure (online chapter) / Terence Spies
- Password-based authenticated key establishment protocols / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan [and others]
- Instant-messaging security / Samuel J.J. Curry
- Part V: Privacy and access management
- Privacy on the internet / Marco Cremonini, Chiara Braghin, Claudio Agostino Ardagna
- Privacy-enhancing technologies / Simone Fischer-Hbner, Stefan Berthold
- Personal privacy policies / George O.M. Yee, Larry Korba
- Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti .[et al.]
- Supporting user privacy prefences in digital interactions / Sara Foresti, Pierangela Samarati
- Privacy and security in environmental monitoring systems : issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livragi [and others]
- Virtual private networks / James T. Harmening
- Identity theft (online chapter) / Markus Jakobsson, Alex Tsow
- VoIP security / Harsh Kupwade Patil, Dan Wing, Thomas M. Chen
- Part VI: Storage security
- SAN security (online chapter) / John McGowan, Jeffrey Bardin, John McDonald
- Storage area networking security devices / Robert Rounsavall
- Risk management / Sokratis K. Katsikas
- Part VII: Physical security
- Physical security essentials / William Stallings
- Disaster recovery / Scott R. Ellis, Lauren Collins
- Biometrics / Luther Martin
- Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor
- Cyber warfare / Anna Granova, Marco Slaviero
- Part VIII: Pracical security
- System security / Lauren Collins
- Securing the infrastructure / Lauren Collins
- Access controls / Lauren Collins
- Assessments and audits / Lauren Collins
- Fundamentals of cryptography / Scott R. Ellis
- Part IX: Advanced security
- Security through diversity / Kevin Noble
- Online e-reputation management services / Jean-Marc Seigneur
- Content filtering (online chapter) / Pete Nicoletti
- Data loss protection / Ken Perkins
- Satellite cyber attack search and destroy / Jeffrey Bardin
- Verifiable voting systems / Thea Peacock, Peter Y.A. Ryan, Steve Schneider [and others]
- Advanced data encryption / Pramad Pandya
- Online chapters
- Firewalls / Dr. Errin W. Fulp
- Public key infrastructure / Terence Spies
- Identit theft / Markus Jakobsson, Alex Tsow
- SAN security / John McGowan, Jeffrey Bardin, John McDonald
- Homeland security / Rahul Bhaskar, Bhushan Kapoor
- Content filtering / Pete Nicoletti.