Asia Pacific University Library catalogue


Computer and information security handbook / edited by John R. Vacca.

Contributor(s): Vacca, John RMaterial type: TextTextSeries: The Morgan Kaufmann series in computer securityPublication details: Amsterdam ; Boston : Burlington, MA : Elsevier ; Morgan Kaufmann, c2009Description: xxxii, 844 p. : ill. ; 29 cmISBN: 9780123743541 (hbk.); 0123743540 (hbk.)Subject(s): Computer networks -- Security measures | Penetration testing (Computer security)DDC classification: 005.8 LOC classification: QA76.9.A25 | C66 2009
Contents:
Overview of system and network security : a comprehensive introduction / John Mallery -- A cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- The botnet problem / Xinyuan Wang and Daniel ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A: Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B: Security management and resiliency / John R. Vacca -- Appendix C: List of top security implementation and deployment companies -- Appendix D: List of security products -- Appendix E: List of security standards -- Appendix F: List of miscellaneous security resources -- Appendix G: Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H: Configuring wireless internet security remote access -- Appendix I: Frequently asked questions -- Appendix J: Glossary.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 C66 2009 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00007171

Includes bibliographical references and index.

Overview of system and network security : a comprehensive introduction / John Mallery -- A cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- The botnet problem / Xinyuan Wang and Daniel ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A: Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B: Security management and resiliency / John R. Vacca -- Appendix C: List of top security implementation and deployment companies -- Appendix D: List of security products -- Appendix E: List of security standards -- Appendix F: List of miscellaneous security resources -- Appendix G: Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H: Configuring wireless internet security remote access -- Appendix I: Frequently asked questions -- Appendix J: Glossary.

There are no comments on this title.

to post a comment.