Computer and information security handbook /
edited by John R. Vacca.
- Amsterdam ; Boston : Burlington, MA : Elsevier ; Morgan Kaufmann, c2009.
- xxxii, 844 p. : ill. ; 29 cm.
- The Morgan Kaufmann series in computer security .
Includes bibliographical references and index.
Overview of system and network security : a comprehensive introduction / A cryptography primer / Preventing system intrusions / Guarding against network intrusions / Unix and Linux security / Eliminating the security weakness of Linux and Unix operating systems / Internet security / The botnet problem / Intranet security / Local area network security / Wireless network security / Cellular network security / RFID security / Information security essentials for IT managers, protecting mission-critical systems / Security management systems / Information technology security management / Identity management / Intrusion prevention and detection systems / Computer forensics / Network forensics / Firewalls / Penetration testing / What is vulnerability assessment? / Data encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy / Personal privacy policies / Virtual private networks / Identity theft / VoIP security / SAN security / Storage area networking devices security / Risk management / Physical security essentials / Biometrics / Homeland security / Information warfare / Security through diversity / Reputation management / Content filtering / Data loss protection / Configuring authentication service on Microsoft Windows Vista / Security management and resiliency / List of top security implementation and deployment companies -- List of security products -- List of security standards -- List of miscellaneous security resources -- Ensuring built-in frequency hopping spread spectrum wireless network security -- Configuring wireless internet security remote access -- Frequently asked questions -- John Mallery -- Scott R. Ellis -- Michael West -- Tom Chen and Patrick J. Walsh -- Gerald Beuchelt -- Mario Santana -- Jesse Walker -- Xinyuan Wang and Daniel ramsbrock -- Bill Mansoor -- Pramod Pandya -- Chunming Rong and Erdal Cayirci -- Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- Chunming Rong and Erdal Cayirci -- Albert Caballero -- Joe Wright and Jim Harmening -- Rahul Bhasker and Bhushan Kapoor -- Jean-Marc Seigneur and Tewfiq El Malika -- Christopher Day -- Scott R. Ellis -- Yong Guan -- Errin W. Fulp -- Sanjay Bavisi -- Almantas Kakareka -- Bhushan Kapoor and Pramod Pandya -- Daniel S. Soper -- Terence Spies -- Samuel J.J. Curry -- Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- George Yee and Larry Korba -- Jim Harmening and Joe Wright -- Markus Jacobsson and Alex Tsow -- Dan Wing and Harsh Kupwade Patil -- John McGowan, Jeffrey Bardin and John McDonald -- Robert Rounsavall -- Sokratis K. Katsikas -- William Stallings -- Luther Martin -- Rahul Bhaskar and Bhushan Kapoor -- Jan Eloff and Anna Granova -- Kevin Noble -- Jean-Marc Seigneur -- Peter Nicoletti -- Ken Perkins -- John R. Vacca -- John R. Vacca -- Appendix A: Appendix B: Appendix C: Appendix D: Appendix E: Appendix F: Appendix G: Appendix H: Appendix I: Appendix J: Glossary.
9780123743541 (hbk.) 0123743540 (hbk.)
2009499916
GBA938836 bnb
015116339 Uk
Computer networks--Security measures.
Penetration testing (Computer security)
QA76.9.A25 / C66 2009
005.8 / COM 2009
Includes bibliographical references and index.
Overview of system and network security : a comprehensive introduction / A cryptography primer / Preventing system intrusions / Guarding against network intrusions / Unix and Linux security / Eliminating the security weakness of Linux and Unix operating systems / Internet security / The botnet problem / Intranet security / Local area network security / Wireless network security / Cellular network security / RFID security / Information security essentials for IT managers, protecting mission-critical systems / Security management systems / Information technology security management / Identity management / Intrusion prevention and detection systems / Computer forensics / Network forensics / Firewalls / Penetration testing / What is vulnerability assessment? / Data encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy / Personal privacy policies / Virtual private networks / Identity theft / VoIP security / SAN security / Storage area networking devices security / Risk management / Physical security essentials / Biometrics / Homeland security / Information warfare / Security through diversity / Reputation management / Content filtering / Data loss protection / Configuring authentication service on Microsoft Windows Vista / Security management and resiliency / List of top security implementation and deployment companies -- List of security products -- List of security standards -- List of miscellaneous security resources -- Ensuring built-in frequency hopping spread spectrum wireless network security -- Configuring wireless internet security remote access -- Frequently asked questions -- John Mallery -- Scott R. Ellis -- Michael West -- Tom Chen and Patrick J. Walsh -- Gerald Beuchelt -- Mario Santana -- Jesse Walker -- Xinyuan Wang and Daniel ramsbrock -- Bill Mansoor -- Pramod Pandya -- Chunming Rong and Erdal Cayirci -- Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- Chunming Rong and Erdal Cayirci -- Albert Caballero -- Joe Wright and Jim Harmening -- Rahul Bhasker and Bhushan Kapoor -- Jean-Marc Seigneur and Tewfiq El Malika -- Christopher Day -- Scott R. Ellis -- Yong Guan -- Errin W. Fulp -- Sanjay Bavisi -- Almantas Kakareka -- Bhushan Kapoor and Pramod Pandya -- Daniel S. Soper -- Terence Spies -- Samuel J.J. Curry -- Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- George Yee and Larry Korba -- Jim Harmening and Joe Wright -- Markus Jacobsson and Alex Tsow -- Dan Wing and Harsh Kupwade Patil -- John McGowan, Jeffrey Bardin and John McDonald -- Robert Rounsavall -- Sokratis K. Katsikas -- William Stallings -- Luther Martin -- Rahul Bhaskar and Bhushan Kapoor -- Jan Eloff and Anna Granova -- Kevin Noble -- Jean-Marc Seigneur -- Peter Nicoletti -- Ken Perkins -- John R. Vacca -- John R. Vacca -- Appendix A: Appendix B: Appendix C: Appendix D: Appendix E: Appendix F: Appendix G: Appendix H: Appendix I: Appendix J: Glossary.
9780123743541 (hbk.) 0123743540 (hbk.)
2009499916
GBA938836 bnb
015116339 Uk
Computer networks--Security measures.
Penetration testing (Computer security)
QA76.9.A25 / C66 2009
005.8 / COM 2009