Cargando…

Computer and information security handbook /

The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Part I: Overview of system and network security : a comprehensive introduction
  • Building a secure organization / John Mallery
  • A cryptography primer / Scott R. Ellis
  • Detecting system intrusions / Almantas Kakareka
  • Preventing system intrusions / Michael West
  • Guarding against network intrusions / Thomas M. Chen, Patrick J. Walsh
  • Securing cloud computing systems / Cem Gurkok
  • Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri
  • Securing web applications, services, and servers / Gerald Beuchelt
  • Unix and Linux security / Gerald Beuchelt
  • Eliminating the security weakness of Linux and Unix operaing systems / Mario Santana
  • Internet security / Jesse Walker
  • The Botnet problem / Daniel Ramsbrock, Xinyuan Wang
  • Intranet security / Bill Mansoor
  • Local area network security / Dr. Pramod Pandya
  • Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan [and others]
  • Wireless sensor network security / Harsh Kupwade Patil, Thomas M. Chen
  • Cellular network security / Penh Liu, Thomas F. La Porta, Kameswari Kotapati
  • RFID security / Chunming Rong, Gansen Zhao, Liang Yan [and others]
  • Optical network security / Lauren Collins
  • Optical wireless security / Scott R. Ellis
  • Part II: Managing information security
  • Information security essentials for IT managers : protecting mission-critical systems / Albert Caballero
  • Security management systems / James T. Harmening
  • Policy-driven system management / Henrik Plate, Cataldo Bsile, Stefano Paraboschi
  • Information technology security management / Rahul Bhaskar, Bhushan Kapoor
  • Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur
  • Intrusion prevention and detection systems / Christopher Day
  • TCP/IP packet analysis / Pramod Pandya
  • The enemy (the intruder's genesis) / Dr. Pramad Pandya
  • Firewalls (online chpater) / Dr. Errin W. Fulp
  • Penetration testing / Sanjay Bavisi
  • What is vulnerability assessment? / Almantas Kakareka
  • Security metrics : an introduction and literature review / George O.M. Yee
  • Part III: Cyber, network, and systems forensics security and assurance
  • Cyber forensics / Scott R. Ellis
  • Cyber forensics and incident response / Cem Gurkok
  • Securing e-discovery / Scott R. Ellis
  • Network forensics / Yong Guan
  • Part IV: Encryption technology
  • Data encryption / Dr. Bhushan Kapoor, Dr. Pramad Pandya
  • Satellite encryption / Daniel S. Soper
  • Public key infrastructure (online chapter) / Terence Spies
  • Password-based authenticated key establishment protocols / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan [and others]
  • Instant-messaging security / Samuel J.J. Curry
  • Part V: Privacy and access management
  • Privacy on the internet / Marco Cremonini, Chiara Braghin, Claudio Agostino Ardagna
  • Privacy-enhancing technologies / Simone Fischer-Hbner, Stefan Berthold
  • Personal privacy policies / George O.M. Yee, Larry Korba
  • Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti .[et al.]
  • Supporting user privacy prefences in digital interactions / Sara Foresti, Pierangela Samarati
  • Privacy and security in environmental monitoring systems : issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livragi [and others]
  • Virtual private networks / James T. Harmening
  • Identity theft (online chapter) / Markus Jakobsson, Alex Tsow
  • VoIP security / Harsh Kupwade Patil, Dan Wing, Thomas M. Chen
  • Part VI: Storage security
  • SAN security (online chapter) / John McGowan, Jeffrey Bardin, John McDonald
  • Storage area networking security devices / Robert Rounsavall
  • Risk management / Sokratis K. Katsikas
  • Part VII: Physical security
  • Physical security essentials / William Stallings
  • Disaster recovery / Scott R. Ellis, Lauren Collins
  • Biometrics / Luther Martin
  • Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor
  • Cyber warfare / Anna Granova, Marco Slaviero
  • Part VIII: Pracical security
  • System security / Lauren Collins
  • Securing the infrastructure / Lauren Collins
  • Access controls / Lauren Collins
  • Assessments and audits / Lauren Collins
  • Fundamentals of cryptography / Scott R. Ellis
  • Part IX: Advanced security
  • Security through diversity / Kevin Noble
  • Online e-reputation management services / Jean-Marc Seigneur
  • Content filtering (online chapter) / Pete Nicoletti
  • Data loss protection / Ken Perkins
  • Satellite cyber attack search and destroy / Jeffrey Bardin
  • Verifiable voting systems / Thea Peacock, Peter Y.A. Ryan, Steve Schneider [and others]
  • Advanced data encryption / Pramad Pandya
  • Online chapters
  • Firewalls / Dr. Errin W. Fulp
  • Public key infrastructure / Terence Spies
  • Identit theft / Markus Jakobsson, Alex Tsow
  • SAN security / John McGowan, Jeffrey Bardin, John McDonald
  • Homeland security / Rahul Bhaskar, Bhushan Kapoor
  • Content filtering / Pete Nicoletti.