Computer and Information Security Handbook, Second Edition

  • 40h 30m
  • John R. Vacca (ed)
  • Elsevier Science and Technology Books, Inc.
  • 2013

The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise.

The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.

  • Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise.
  • Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.
  • Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions.

About the Editor

John Vacca is an information technology consultant, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 72 books, including:

Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012 ); System Forensics, Investigation, And Response (Publisher: Jones & Bartlett Learning (September 24, 2010); Managing Information Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Network and Systems Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Computer and Information Security Handbook (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 2, 2009)); Biometric Technologies and Verification Systems (Publisher: Elsevier Science & Technology Books (March 16, 2007)); Practical Internet Security (Hardcover): (Publisher: Springer (October 18, 2006)); Optical Networking Best Practices Handbook (Hardcover): (Publisher: Wiley-Interscience (November 28, 2006)); Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition (Publisher: Charles River Media (May 26, 2005)

John Vacca has also written more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995. In addition, John is also an independent online book reviewer. Finally, John was one of the security consultants for the MGM movie titled: "AntiTrust," which was released on January 12, 2001.

In this Book

  • Foreword
  • Building a Secure Organization
  • A Cryptography Primer
  • Detecting System Intrusions
  • Preventing System Intrusions
  • Guarding against Network Intrusions
  • Securing Cloud Computing Systems
  • Fault Tolerance and Resilience in Cloud Computing Environments
  • Securing Web Applications, Services, and Servers
  • Unix and Linux Security
  • Eliminating the Security Weakness of Linux and Unix Operating Systems
  • Internet Security
  • The Botnet Problem
  • Intranet Security
  • Local Area Network Security
  • Wireless Network Security
  • Wireless Sensor Network Security
  • Cellular Network Security
  • RFID Security
  • Optical Network Security
  • Optical Wireless Security
  • Information Security Essentials for IT Managers—Protecting Mission-Critical Systems
  • Security Management Systems
  • Policy-Driven System Management
  • Information Technology Security Management
  • Online Identity and User Management Services
  • Intrusion Prevention and Detection Systems
  • TCP/IP Packet Analysis
  • The Enemy (The Intruder's Genesis)
  • Firewalls
  • Penetration Testing
  • What is Vulnerability Assessment?
  • Security Metrics—An Introduction and Literature Review
  • Cyber Forensics
  • Cyber Forensics and Incident Response
  • Securing e-Discovery
  • Network Forensics
  • Data Encryption
  • Satellite Encryption
  • Public Key Infrastructure
  • Password-Based Authenticated Key Establishment Protocols
  • Instant-Messaging Security
  • Privacy on the Internet
  • Privacy-Enhancing Technologies
  • Personal Privacy Policies
  • Detection of Conflicts in Security Policies
  • Supporting User Privacy Preferences in Digital Interactions
  • Privacy and Security in Environmental Monitoring Systems—Issues and Solutions
  • Virtual Private Networks
  • Identity Theft
  • VoIP Security
  • SAN Security
  • Storage Area Networking Security Devices
  • Risk Management
  • Physical Security Essentials
  • Disaster Recovery
  • Biometrics
  • Homeland Security
  • Cyber Warfare
  • System Security
  • Securing the Infrastructure
  • Access Controls
  • Assessments and Audits
  • Fundamentals of Cryptography
  • Security Through Diversity
  • Online e-Reputation Management Services
  • Content Filtering
  • Data Loss Protection
  • Satellite Cyber Attack Search and Destroy
  • Verifiable Voting Systems
  • Advanced Data Encryption
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)