Computer and Information Security Handbook 2nd Edition

Computer and Information Security Handbook,Second EditionComputer and Information Security Handbook,Second Edition
ISBN-10: 0123943973
ISBN-13: 9780123943972
Edition 版次: 2
Publication Date 出版日期: 2013-06-07
Print Length 页数: 1200


Book Description
By finelybook

The Computer and Information Security Handbook,2nd Edition provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory,technology,and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security,information management,cyber warfare and security,encryption technology,privacy,data storage,physical security,and a host of advanced security topics. New to this edition are chapters on intrusion detection,securing the cloud,securing web apps,ethical hacking,cyber forensics,physical security,disaster recovery,cyber attack deterrence,and more.
Chapters by leaders in the field on theory and practice of computer and information security technology,allowing the reader to develop a new level of technical expertise
Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints
Presents methods of analysis and problem-solving techniques,enhancing the reader’s grasp of the material and ability to implement practical solutions
Contents
Part I Overview Of System And Network Security: A Comprehensive Introduction
Chapter 1 Building A Secure Organization
Chapter 2 A Cryptography Primer
Chapter 3 Detecting System Intrusions
Chapter 4 Preventing System Intrusions
Chapter 5 Guarding Against Network Intrusions
Chapter 6 Securing Cloud Computing Systems
Chapter 7 Fault Tolerance And Resilience In Cloud Computing Environments
Chapter 8 Securing Web Applications,Services And Servers
Chapter 9 Unix And Linux Security
Chapter 10 Eliminating The Security Weakness Of Linux And Unix Operating Systems
Chapter 11 Internet Security
Chapter 12 The Botnet Problem
Chapter 13 Intranet Security
Chapter 14 Local Area Network Security
Chapter 15 Wireless Network Security
Chapter 16 Wireless Sensor Network Security
Chapter 17 Cellular Network Security
Chapter 18 Rfid Security
Chapter 19 Optical Network Security
Chapter 20 Optical Wireless Security
Part II Managing Information Security
Chapter 21 Information Security Essentials For It Managers: Protecting Mission-Critical Systems
Chapter 22 Security Management Systems
Chapter 23 Policy-Driven System Management
Chapter 24 Information Technology Security Management
Chapter 25 Online Identity And User Management Services
Chapter 26 Intrusion Prevention And Detection Systems
Chapter 27 Tcp/Ip Packet Analysis
Chapter 28 The Enemy (The Intruder’S Genesis)
Chapter 29 Firewalls
Chapter 30 Penetration Testing
Chapter 31 What Is Vulnerability Assessment?
Chapter 32 Security Metrics: An Introduction And Literature Review
Part III Cyber,Network,And Systems Forensics Security And Assurance
Chapter 33 Cyber Forensics
Chapter 34 Cyber Forensics And Incidence Response
Chapter 35 Securing E-Discovery
Chapter 36 Network Forensics
Part IV Encryption Technology
Chapter 37 Data Encryption
Chapter 38 Satellite Encryption
Chapter 39 Public Key Infrastructure
Chapter 40 Password-Based Authenticated Key Establishment Protocol
Chapter 41 Instant-Messaging Security
Part V Privacy And Access Management
Chapter 42 Privacy On The Internet
Chapter 43 Privacy-Enhancing Technologies
Chapter 44 Personal Privacy Policies
Chapter 45 Detection Of Conflicts In Security Policies
Chapter 46 Supporting User Privacy Preferences In Digital Interactions
Chapter 47 Privacy And Security In Environmental Monitoring Systems: Issues And Solutions
Chapter 48 Virtual Private Networks
Chapter 49 Identity Theft
Chapter 50 Voip Security
Part VI Storage Security
Chapter 51 San Security
Chapter 52 Storage Area Networking Security Devices
Chapter 53 Risk Management
Part VII Physical Security
Chapter 54 Physical Security Essentials
Chapter 55 Disaster Recovery
Chapter 56 Biometrics
Chapter 57 Homeland Security
Chapter 58 Cyber Warfare
Chapter 59 System Security
Chapter 60 Securing The Infrastructure
Chapter 61 Access Controls
Chapter 62 Assessments And Audits
Chapter 63 Fundamentals Of Cryptography
Part IX Advanced Security
Chapter 64 Security Through Diversity
Chapter 65 Online E-Reputation Management Services
Chapter 66 Content Filtering
Chapter 67 Data Loss Protection
Chapter 68 Satellite Cyber Attack Search And Destroy
Chapter 69 Verifiable Voting Systems
Chapter 70 Advanced Data Encryption
Part X Appendices
Appendix A Configuring Authentication Service On Microsoft Windows 7
Appendix B Security Management And Resiliency
Appendix C List Of Top Information And Network Security Implementation And Deployment Companies
Appendix D List Of Security Products
Appendix E List Of Security Standards
Appendix F List Of Miscellaneous Security Resources
Appendix G Ensuring Built-In Frequency Hopping Spread Spectrum Wireless Network Security
Appendix H Configuring Wireless Internet Security Remote Access
Appendix I Frequently Asked Questions
Appendix J Case Studies
Book Details
MK Computer and Information Security Handbook 2nd Edition 9780123943972.pdf:
https://finelybook.com/fs/15081096-482522922-6d308d

相关文件下载地址

打赏
未经允许不得转载:finelybook » Computer and Information Security Handbook 2nd Edition

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫