Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Book/E-Doc

Title Computer and information security handbook / edited by John R. Vacca.

Imprint Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Edition 2nd ed.
Description 1 online resource
text txt rdacontent
still image sti rdacontent
computer c rdamedia
online resource cr rdacarrier
text file
Bibliography Includes bibliographical references and index.
Note Print version record.
Summary The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions.
Contents Part I: Overview of system and network security : a comprehensive introduction -- Building a secure organization / John Mallery -- A cryptography primer / Scott R. Ellis -- Detecting system intrusions / Almantas Kakareka -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Thomas M. Chen, Patrick J. Walsh -- Securing cloud computing systems / Cem Gurkok -- Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- Securing web applications, services, and servers / Gerald Beuchelt -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operaing systems / Mario Santana -- Internet security / Jesse Walker -- The Botnet problem / Daniel Ramsbrock, Xinyuan Wang -- Intranet security / Bill Mansoor -- Local area network security / Dr. Pramod Pandya -- Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan [and others] -- Wireless sensor network security / Harsh Kupwade Patil, Thomas M. Chen -- Cellular network security / Penh Liu, Thomas F. La Porta, Kameswari Kotapati -- RFID security / Chunming Rong, Gansen Zhao, Liang Yan [and others] -- Optical network security / Lauren Collins -- Optical wireless security / Scott R. Ellis -- Part II: Managing information security -- Information security essentials for IT managers : protecting mission-critical systems / Albert Caballero -- Security management systems / James T. Harmening -- Policy-driven system management / Henrik Plate, Cataldo Bsile, Stefano Paraboschi -- Information technology security management / Rahul Bhaskar, Bhushan Kapoor -- Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- Intrusion prevention and detection systems / Christopher Day -- TCP/IP packet analysis / Pramod Pandya -- The enemy (the intruder's genesis) / Dr. Pramad Pandya -- Firewalls (online chpater) / Dr. Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Security metrics : an introduction and literature review / George O.M. Yee -- Part III: Cyber, network, and systems forensics security and assurance -- Cyber forensics / Scott R. Ellis -- Cyber forensics and incident response / Cem Gurkok -- Securing e-discovery / Scott R. Ellis -- Network forensics / Yong Guan -- Part IV: Encryption technology -- Data encryption / Dr. Bhushan Kapoor, Dr. Pramad Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure (online chapter) / Terence Spies -- Password-based authenticated key establishment protocols / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan [and others] -- Instant-messaging security / Samuel J.J. Curry -- Part V: Privacy and access management -- Privacy on the internet / Marco Cremonini, Chiara Braghin, Claudio Agostino Ardagna -- Privacy-enhancing technologies / Simone Fischer-Hbner, Stefan Berthold -- Personal privacy policies / George O.M. Yee, Larry Korba -- Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti .[et al.] -- Supporting user privacy prefences in digital interactions / Sara Foresti, Pierangela Samarati -- Privacy and security in environmental monitoring systems : issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livragi [and others] -- Virtual private networks / James T. Harmening -- Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- VoIP security / Harsh Kupwade Patil, Dan Wing, Thomas M. Chen -- Part VI: Storage security -- SAN security (online chapter) / John McGowan, Jeffrey Bardin, John McDonald -- Storage area networking security devices / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Part VII: Physical security -- Physical security essentials / William Stallings -- Disaster recovery / Scott R. Ellis, Lauren Collins -- Biometrics / Luther Martin -- Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- Cyber warfare / Anna Granova, Marco Slaviero -- Part VIII: Pracical security -- System security / Lauren Collins -- Securing the infrastructure / Lauren Collins -- Access controls / Lauren Collins -- Assessments and audits / Lauren Collins -- Fundamentals of cryptography / Scott R. Ellis -- Part IX: Advanced security -- Security through diversity / Kevin Noble -- Online e-reputation management services / Jean-Marc Seigneur -- Content filtering (online chapter) / Pete Nicoletti -- Data loss protection / Ken Perkins -- Satellite cyber attack search and destroy / Jeffrey Bardin -- Verifiable voting systems / Thea Peacock, Peter Y.A. Ryan, Steve Schneider [and others] -- Advanced data encryption / Pramad Pandya -- Online chapters -- Firewalls / Dr. Errin W. Fulp -- Public key infrastructure / Terence Spies -- Identit theft / Markus Jakobsson, Alex Tsow -- SAN security / John McGowan, Jeffrey Bardin, John McDonald -- Homeland security / Rahul Bhaskar, Bhushan Kapoor -- Content filtering / Pete Nicoletti.
Language English.
Subject Computer networks -- Security measures.
Penetration testing (Computer security)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Tests d'intrusion.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Security measures
Penetration testing (Computer security)
Datanät -- säkerhetsaspekter.
Datasäkerhet.
Datornätverk -- säkerhetsaspekter.
Datorer -- säkerhetsaspekter.
Datorsäkerhet.
IT-säkerhet.
Added Author Vacca, John R.
Other Form: Print version: Computer and information security handbook. 2nd ed. Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013] 9780123943972 (DLC) 2013020996 (OCoLC)845350155
ISBN 9780123946126 (electronic bk.)
0123946123 (electronic bk.)
9781784023447
1784023442
9780123943972
0123943973
Standard No. (WaSeSS)ssj0000885463
AU@ 000051860171
CHNEW 000603961
CHNEW 001026503
CHVBK 303089547
DEBBG BV043960329
DEBBG BV044175814
DEBSZ 405348908
DEBSZ 431424209
DEBSZ 481273417
NLGGC 358140870
NZ1 15193696
UKMGB 017596556
UKMGB 017990617
DKDLA 820120-katalog:999939041905765

 
    
Available items only