Computer Security Handbook, Sixth Edition

  • 56h 47m
  • Eric Whyne (eds), Michel E. Kabay, Seymour Bosworth
  • John Wiley & Sons (US)
  • 2014

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.

In this Book

  • Brief History and Mission of Information System Security
  • History of Computer Crime
  • Toward a New Framework for Information Security
  • Hardware Elements of Security
  • Data Communications and Information Security
  • Local Area Network Topologies, Protocols, and Design
  • Encryption
  • Using a Common Language for Computer Security Incident Information
  • Mathematical Models of Computer Security
  • Understanding Studies and Surveys of Computer Crime
  • Fundamentals of Intellectual Property Law
  • The Psychology of Computer Criminals
  • The Insider Threat
  • Information Warfare
  • Penetrating Computer Systems and Networks
  • Malicious Code
  • Mobile Code
  • Denial-of-Service Attacks
  • Social-Engineering And Low-Tech Attacks
  • Spam, Phishing, and Trojans: Attacks Meant to Fool
  • Web-Based Vulnerabilities
  • Physical Threats to the Information Infrastructure
  • Protecting the Physical Information Infrastructure
  • Operating System Security
  • Local Area Networks
  • Gateway Security Devices
  • Intrusion Detection and Intrusion Prevention Devices
  • Identification and Authentication
  • Biometric Authentication
  • E-Commerce and Web Server Safeguards
  • Web Monitoring and Content Filtering
  • Virtual Private Networks and Secure Remote Access
  • 802.11 Wireless Lan Security
  • Securing VoIP
  • Securing P2P, IM, SMS, and Collaboration Tools
  • Securing Stored Data
  • PKI and Certificate Authorities
  • Writing Secure Code
  • Software Development And Quality Assurance
  • Managing Software Patches and Vulnerabilities
  • Antivirus Technology
  • Protecting Digital Rights: Technical Approaches
  • Ethical Decision Making and High Technology
  • Security Policy Guidelines
  • Employment Practices and Policies
  • Vulnerability Assessment
  • Operations Security and Production Controls
  • Email and Internet Use Policies
  • Implementing a Security-Awareness Program
  • Using Social Psychology to Implement Security Policies
  • Security Standards for Products
  • Application Controls
  • Monitoring and Control Systems
  • Security Audits
  • Cyber Investigation
  • Computer Security Incident Response Teams
  • Data Backups and Archives
  • Business Continuity Planning
  • Disaster Recovery
  • Insurance Relief
  • Working with Law Enforcement
  • Quantitative Risk Assessment and Risk Management
  • Management Responsibilities and Liabilities
  • U.S. Legal and Regulatory Security Issues
  • The Role of the CISO
  • Developing Security Policies
  • Developing Classification Policies for Data
  • Outsourcing and Security
  • Privacy in Cyberspace: U.S. and European Perspectives
  • Anonymity and Identity in Cyberspace
  • Healthcare Security and Privacy
  • Legal and Policy Issues of Censorship and Content Filtering
  • Expert Witnesses and the Daubert Challenge
  • Professional Certification and Training in Information Assurance
  • The Future of Information Assurance
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)