Computer and information security handbook
    (2013)

    Nonfiction

    Book

    Call Numbers:
    005.8/COMPUTER

Availability

Locations Call Number Status
Adult Nonfiction 005.8/COMPUTER Available

Details

PUBLISHED
Amsterdam : Morgan Kaufmann, an imprint of Elsevier, [2013]
EDITION
Second edition
DESCRIPTION
xxviii, 1171 pages : illustrations ; 29 cm
ISBN/ISSN
9780123943972, 0123943973, 9780123943972, 0123943973 :
LANGUAGE
English
NOTES

Part I: Overview of system and network security : a comprehensive introduction -- Building a secure organization / John Mallery -- A cryptography primer / Scott R. Ellis -- Detecting system intrusions / Almantas Kakareka -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Thomas M. Chen, Patrick J. Walsh -- Securing cloud computing systems / Cem Gurkok -- Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- Securing web applications, services, and servers / Gerald Beuchelt -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operaing systems / Mario Santana -- Internet security / Jesse Walker -- The Botnet problem / Daniel Ramsbrock, Xinyuan Wang -- Intranet security / Bill Mansoor -- Local area network security / Dr. Pramod Pandya -- Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan ...[et al.] -- Wireless sensor network security / Harsh Kupwade Patil, Thomas M. Chen -- Cellular network security / Penh Liu, Thomas F. La Porta, Kameswari Kotapati -- RFID security / Chunming Rong, Gansen Zhao, Liang Yan ...[ et al.] -- Optical network security / Lauren Collins -- Optical wireless security / Scott R. Ellis -- Part II: Managing information security -- Information security essentials for IT managers : protecting mission-critical systems / Albert Caballero -- Security management systems / James T. Harmening -- Policy-driven system management / Henrik Plate, Cataldo Bsile, Stefano Paraboschi -- Information technology security management / Rahul Bhaskar, Bhushan Kapoor -- Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- Intrusion prevention and detection systems / Christopher Day -- TCP/IP packet analysis / Pramod Pandya -- The enemy (the intruder's genesis) / Dr. Pramad Pandya -- Firewalls (online chpater) / Dr. Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Security metrics : an introduction and literature review / George O. M. Yee -- Part III: Cyber, network, and systems forensics security and assurance -- Cyber forensics / Scott R. Ellis -- Cyber forensics and incident response / Cem Gurkok -- Securing e-discovery / Scott R. Ellis -- Network forensics / Yong Guan -- Part IV: Encryption technology -- Data encryption / Dr. Bhushan Kapoor, Dr. Pramad Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure (online chapter) / Terence Spies -- Password-based authenticated key establishment protocols / Jean Lancrenon, Dalia Khader, Peter Y. A. Ryan ...[et al.] -- Instant-messaging security / Samuel J. J. Curry -- Part V: Privacy and access management -- Privacy on the internet / Marco Cremonini, Chiara Braghin, Claudio Agostino Ardagna -- Privacy-enhancing technologies / Simone Fischer-Hbner, Stefan Berthold -- Personal privacy policies / George O. M. Yee, Larry Korba -- Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti ..[et al.] -- Supporting user privacy prefences in digital interactions / Sara Foresti, Pierangela Samarati -- Privacy and security in environmental monitoring systems : issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livragi ...[et al.] -- Virtual private networks / James T. Harmening -- Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- VoIP security / Harsh Kupwade Patil, Dan Wing, Thomas M. Chen -- Part VI: Storage security -- SAN security (online chapter) / John McGowan, Jeffrey Bardin, John McDonald -- Storage area networking security devices / Robert Rounsavall -- Risk mangement / Sokratis K. Katsikas -- Part VII: Physical security -- Physical security essentials / William Stallings -- Disaster recovery / Scott R. Ellis, Lauren Collins -- Biometrics / Luther Martin -- Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- Cyber warfare / Anna Granova, Marco Slaviero -- Part VIII: Pracical security -- System security / Lauren Collins -- Securing the infrastructure / Lauren Collins -- Access controls / Lauren Collins -- Assessments and audits / Lauren Collins -- Fundamentals of cryptography / Scott R. Ellis -- Part IX: Advanced security -- Security through diversity / Kevin Noble -- Online e-reputation management services / Jean-Marc Seigneur -- Content filtering (online chapter) / Pete Nicoletti -- Data loss protection / Ken Perkins -- Satellite cyber attack search and destroy / Jeffrey Bardin -- Verifiable voting systems / Thea Peacock, Peter Y. A. Ryan, Steve Schneider ...[et al.] -- Advanced data encryption / Pramad Pandya -- Online chapters -- Firewalls / Dr. Errin W. Fulp -- Public key infrastructure / Terence Spies -- Identit theft / Markus Jakobsson, Alex Tsow -- SAN security / John McGowan, Jeffrey Bardin, John McDonald -- Homeland security / Rahul Bhaskar, Bhushan Kapoor -- Content filtering / Pete Nicoletti

Additional Credits