Computer and Information Security Handbook 2nd Edition by Vacca, John – Ebook PDF Instant Download/Delivery:9780123946126, 0123946123
Full dowload Computer and Information Security Handbook 2nd Edition after payment
Product details:
• ISBN 10:0123946123
• ISBN 13:9780123946126
• Author: Vacca, John
Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
Computer and Information Security Handbook 2nd Table of contents:
Chapter 1: Building A Secure Organization
Chapter 2: A Cryptography Primer
Chapter 3: Detecting System Intrusions
Chapter 4: Preventing System Intrusions
Chapter 5: Guarding Against Network Intrusions
Chapter 6: Securing Cloud Computing Systems
Chapter 7: Fault Tolerance and Resilience in Cloud Computing Environments
Chapter 8: Securing Web Applications, Services and Servers
Chapter 9: UNIX and Linux Security
Chapter 10: Eliminating the Security Weakness of Linux and UNIX Operating Systems
Chapter 11: Internet Security
Chapter 12: The Botnet Problem
Chapter 13: Intranet Security
Chapter 14: Local Area Network Security
Chapter 15: Wireless Network Security
Chapter 16: Wireless Sensor Network Security
Chapter 17: Cellular Network Security
Chapter 18: RFID Security
Chapter 19: Optical Network Security
Chapter 20: Optical Wireless Security
Chapter 21: Information Security Essentials for IT Managers: Protecting Mission-Critical Systems
Chapter 22: Security Management Systems
Chapter 23: Policy-Driven System Management
Chapter 24: Information Technology Security Management
Chapter 25: Online Identity and User Management Services
Chapter 26: Intrusion Detection And Prevention Systems
Chapter 27: TCP/IP Packet Analysis
Chapter 28: The Enemy (The Intruder’s Genesis)
Chapter 29: Firewalls
Chapter 30: Penetration Testing
Chapter 31: Building A Secure Organization
Chapter 32: Security Metrics: An Introduction and Literature Review
Chapter 33: Cyber Forensics
Chapter 34: Cyber Forensics And Incident Response
Chapter 35: Secure E-Discovery
Chapter 36: Network Forensics
Chapter 37: Data Encryption
Chapter 38: Satellite Encryption
Chapter 39: Public Key Infrastructure
Chapter 40: Password-based Authenticated Key Establishment Protocols
Chapter 41: Instant-Messaging Security
Chapter 42: Privacy On The Internet
Chapter 43: Physical Security Essentials
Chapter 44: Personal Privacy Policies
Chapter 45: Detection Of Conflicts In Security Policies
Chapter 46: Supporting User Privacy Preferences in Digital Interactions
Chapter 47: Physical Security Essentials
Chapter 48: Virtual Private Networks
Chapter 49: Identity Theft
Chapter 50: Physical Security Essentials
Chapter 51: SAN Security
Chapter 52: Storage Area Networking Security Devices
Chapter 53: Risk Management
Chapter 54: Physical Security Essentials
Chapter 55: Disaster Recovery
Chapter 56: Biometrics
Chapter 57: Homeland Security
Chapter 58: Cyber Warefare
Chapter 59: Systems Security
Chapter 60: Securing The Infrastructure
Chapter 61: Access Controls
Chapter 62: Assessments And Audits
Chapter 63: Fundamentals Of Cryptography
Chapter 64: Security Through Diversity
Chapter 65: Online e-Reputation Management Services
Chapter 66: Content Filtering
Chapter 67: Data Loss Protection
Chapter 68: Satellite Cyber Attack Search And Destroy
Chapter 69: Verifiable Voting Systems
Chapter 70: Advanced Data Encryption
Appendix eL. Glossary
Index
Read Less
People also search for Computer and Information Security Handbook 2nd:
computer and information security handbook
computer and information security handbook 4th edition
computer and information security handbook pdf
computer and information security handbook by john r. vacca
computer and information security handbook 3rd edition
Reviews
There are no reviews yet.