TY - BOOK AU - Vacca,John R. TI - Computer and information security handbook T2 - The Morgan Kaufmann series in computer security SN - 9780123743541 (hbk.) AV - QA76.9.A25 C66 2009 U1 - 005.8 22 PY - 2009/// CY - Amsterdam, Boston, Burlington, MA PB - Elsevier, Morgan Kaufmann KW - Computer networks KW - Security measures KW - Penetration testing (Computer security) N1 - Includes bibliographical references and index; Overview of system and network security : a comprehensive introduction; John Mallery --; A cryptography primer; Scott R. Ellis --; Preventing system intrusions; Michael West --; Guarding against network intrusions; Tom Chen and Patrick J. Walsh --; Unix and Linux security; Gerald Beuchelt --; Eliminating the security weakness of Linux and Unix operating systems; Mario Santana --; Internet security; Jesse Walker --; The botnet problem; Xinyuan Wang and Daniel ramsbrock --; Intranet security; Bill Mansoor --; Local area network security; Pramod Pandya --; Wireless network security; Chunming Rong and Erdal Cayirci --; Cellular network security; Peng Liu, Thomas F. LaPorta and Kameswari Kotapati --; RFID security; Chunming Rong and Erdal Cayirci --; Information security essentials for IT managers, protecting mission-critical systems; Albert Caballero --; Security management systems; Joe Wright and Jim Harmening --; Information technology security management; Rahul Bhasker and Bhushan Kapoor --; Identity management; Jean-Marc Seigneur and Tewfiq El Malika --; Intrusion prevention and detection systems; Christopher Day --; Computer forensics; Scott R. Ellis --; Network forensics; Yong Guan --; Firewalls; Errin W. Fulp --; Penetration testing; Sanjay Bavisi --; What is vulnerability assessment?; Almantas Kakareka --; Data encryption; Bhushan Kapoor and Pramod Pandya --; Satellite encryption; Daniel S. Soper --; Public key infrastructure; Terence Spies --; Instant-messaging security; Samuel J.J. Curry --; NET privacy; Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --; Personal privacy policies; George Yee and Larry Korba --; Virtual private networks; Jim Harmening and Joe Wright --; Identity theft; Markus Jacobsson and Alex Tsow --; VoIP security; Dan Wing and Harsh Kupwade Patil --; SAN security; John McGowan, Jeffrey Bardin and John McDonald --; Storage area networking devices security; Robert Rounsavall --; Risk management; Sokratis K. Katsikas --; Physical security essentials; William Stallings --; Biometrics; Luther Martin --; Homeland security; Rahul Bhaskar and Bhushan Kapoor --; Information warfare; Jan Eloff and Anna Granova --; Security through diversity; Kevin Noble --; Reputation management; Jean-Marc Seigneur --; Content filtering; Peter Nicoletti --; Data loss protection; Ken Perkins --; Appendix A; Configuring authentication service on Microsoft Windows Vista; John R. Vacca --; Appendix B; Security management and resiliency; John R. Vacca --; Appendix C; List of top security implementation and deployment companies --; Appendix D; List of security products --; Appendix E; List of security standards --; Appendix F; List of miscellaneous security resources --; Appendix G; Ensuring built-in frequency hopping spread spectrum wireless network security --; Appendix H; Configuring wireless internet security remote access --; Appendix I; Frequently asked questions --; Appendix J: Glossary ER -