Loading…

Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Other Authors: Bidgoli, Hossein
Format: Electronic eBook
Language:Inglés
Published: Hoboken, N.J. : John Wiley, ©2006.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Preface
  • Guide to The Handbook of Information Security
  • Internal Security Threats
  • Physical Security Threats
  • Fixed-Line Telephone System Vulnerabilities
  • E-Mail Threats and Vulnerabilities
  • E-Commerce Vulnerabilities
  • Hacking Techniques in Wired Networks Hacking
  • Hacking Techniques in Wireless Networks
  • Computer Viruses and Worms
  • Trojan Horse Programs
  • Hoax Viruses and Virus Alerts
  • Hostile Java Applets
  • Spyware
  • Mobile Code and Security
  • Wireless Threats and Attacks
  • WEP Security
  • Bluetooth Security
  • Cracking WEP
  • Denial of Service Attacks
  • Network Attacks
  • Fault Attacks
  • Side-Channel Attacks
  • Physical Security Measures
  • RFID and Security
  • Cryptographic Privacy Protection Techniques
  • Cryptographic Hardware Security Modules
  • Smart Card Security
  • Client-Side Security
  • Server-Side Security
  • Protecting Web Sites
  • Database Security
  • Medical Records Security
  • Access Control: Principles and Solutions
  • Password Authentication
  • Computer and Network Authentication
  • Antivirus Technology
  • Biometric Basics and Biometric Authentication
  • Issues and Concerns in Biometric IT Security
  • Firewall Basics
  • Firewall Architectures
  • Packet Filtering and Stateful Firewalls
  • Proxy Firewalls
  • E-Commerce Safeguards
  • Digital Signatures and Electronic Signatures
  • E-Mail Security
  • Security for ATM Networks
  • VPN Basics
  • VPN Architecture
  • IP-Based VPN
  • Identity Management
  • The Use of Deception Techniques: Honeypots and Decoys
  • Active Response to Computer Intrusions
  • Intrusion Detection Systems Basics
  • Host-Based Intrusion Detection Systems
  • Network-Based Intrusion Detection Systems
  • The Use of Agent Technology for Intrusion Detection
  • Contingency Planning Management
  • Computer Security Incident Response Teams (CSIRTs)
  • Implementing a Security Awareness Program
  • Risk Management for IT Security
  • Security Insurance and Best Practices
  • Auditing Information Systems Security
  • Evidence Collection and Analysis Tools
  • Information Leakage: Detection and Countermeasures
  • Digital Rights Management
  • Web Hosting
  • Managing a Network Environment
  • E-Mail and Internet Use Policies
  • Forward Security Adaptive Cryptography: Time Evolution
  • Security Policy Guidelines
  • Asset- Security Goals Continuum: A Process for Security
  • Multilevel Security
  • Multilevel Security Models
  • Security Architectures
  • Quality of Security Service: Adaptive Security
  • Security Policy Enforcement
  • Guidelines for a Comprehensive Security System.