000 | 04313cam a22003497a 4500 | ||
---|---|---|---|
001 | 16036441 | ||
003 | APU | ||
005 | 20151118051504.0 | ||
008 | 091229s2009 ne a b 001 0 eng c | ||
010 | _a 2009499916 | ||
015 |
_aGBA938836 _2bnb |
||
016 | 7 |
_a015116339 _2Uk |
|
020 | _a9780123743541 (hbk.) | ||
020 | _a0123743540 (hbk.) | ||
035 | _a(OCoLC)ocn299240534 | ||
040 |
_aYDXCP _cYDXCP _dNEDA _dANA _beng |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bC66 2009 |
082 | 0 | 4 |
_a005.8 _222 _bCOM 2009 |
245 | 0 | 0 |
_aComputer and information security handbook / _cedited by John R. Vacca. |
260 |
_aAmsterdam ; _aBoston : _bElsevier ; _aBurlington, MA : _bMorgan Kaufmann, _cc2009. |
||
300 |
_axxxii, 844 p. : _bill. ; _c29 cm. |
||
490 | 0 | _aThe Morgan Kaufmann series in computer security | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | 0 |
_tOverview of system and network security : a comprehensive introduction / _rJohn Mallery -- _tA cryptography primer / _rScott R. Ellis -- _tPreventing system intrusions / _rMichael West -- _tGuarding against network intrusions / _rTom Chen and Patrick J. Walsh -- _tUnix and Linux security / _rGerald Beuchelt -- _tEliminating the security weakness of Linux and Unix operating systems / _rMario Santana -- _tInternet security / _rJesse Walker -- _tThe botnet problem / _rXinyuan Wang and Daniel ramsbrock -- _tIntranet security / _rBill Mansoor -- _tLocal area network security / _rPramod Pandya -- _tWireless network security / _rChunming Rong and Erdal Cayirci -- _tCellular network security / _rPeng Liu, Thomas F. LaPorta and Kameswari Kotapati -- _tRFID security / _rChunming Rong and Erdal Cayirci -- _tInformation security essentials for IT managers, protecting mission-critical systems / _rAlbert Caballero -- _tSecurity management systems / _rJoe Wright and Jim Harmening -- _tInformation technology security management / _rRahul Bhasker and Bhushan Kapoor -- _tIdentity management / _rJean-Marc Seigneur and Tewfiq El Malika -- _tIntrusion prevention and detection systems / _rChristopher Day -- _tComputer forensics / _rScott R. Ellis -- _tNetwork forensics / _rYong Guan -- _tFirewalls / _rErrin W. Fulp -- _tPenetration testing / _rSanjay Bavisi -- _tWhat is vulnerability assessment? / _rAlmantas Kakareka -- _tData encryption / _rBhushan Kapoor and Pramod Pandya -- _tSatellite encryption / _rDaniel S. Soper -- _tPublic key infrastructure / _rTerence Spies -- _tInstant-messaging security / _rSamuel J.J. Curry -- _tNET privacy / _rMarco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- _tPersonal privacy policies / _rGeorge Yee and Larry Korba -- _tVirtual private networks / _rJim Harmening and Joe Wright -- _tIdentity theft / _rMarkus Jacobsson and Alex Tsow -- _tVoIP security / _rDan Wing and Harsh Kupwade Patil -- _tSAN security / _rJohn McGowan, Jeffrey Bardin and John McDonald -- _tStorage area networking devices security / _rRobert Rounsavall -- _tRisk management / _rSokratis K. Katsikas -- _tPhysical security essentials / _rWilliam Stallings -- _tBiometrics / _rLuther Martin -- _tHomeland security / _rRahul Bhaskar and Bhushan Kapoor -- _tInformation warfare / _rJan Eloff and Anna Granova -- _tSecurity through diversity / _rKevin Noble -- _tReputation management / _rJean-Marc Seigneur -- _tContent filtering / _rPeter Nicoletti -- _tData loss protection / _rKen Perkins -- _gAppendix A: _tConfiguring authentication service on Microsoft Windows Vista / _rJohn R. Vacca -- _gAppendix B: _tSecurity management and resiliency / _rJohn R. Vacca -- _gAppendix C: _tList of top security implementation and deployment companies -- _gAppendix D: _tList of security products -- _gAppendix E: _tList of security standards -- _gAppendix F: _tList of miscellaneous security resources -- _gAppendix G: _tEnsuring built-in frequency hopping spread spectrum wireless network security -- _gAppendix H: _tConfiguring wireless internet security remote access -- _gAppendix I: _tFrequently asked questions -- _gAppendix J: Glossary. |
650 | 0 |
_aComputer networks _xSecurity measures. _977 |
|
650 | 0 |
_aPenetration testing (Computer security) _911344 |
|
700 | 1 |
_aVacca, John R. _913545 |
|
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBook _06 |
||
999 |
_c7396 _d7396 |