000 04313cam a22003497a 4500
001 16036441
003 APU
005 20151118051504.0
008 091229s2009 ne a b 001 0 eng c
010 _a 2009499916
015 _aGBA938836
_2bnb
016 7 _a015116339
_2Uk
020 _a9780123743541 (hbk.)
020 _a0123743540 (hbk.)
035 _a(OCoLC)ocn299240534
040 _aYDXCP
_cYDXCP
_dNEDA
_dANA
_beng
042 _alccopycat
050 0 0 _aQA76.9.A25
_bC66 2009
082 0 4 _a005.8
_222
_bCOM 2009
245 0 0 _aComputer and information security handbook /
_cedited by John R. Vacca.
260 _aAmsterdam ;
_aBoston :
_bElsevier ;
_aBurlington, MA :
_bMorgan Kaufmann,
_cc2009.
300 _axxxii, 844 p. :
_bill. ;
_c29 cm.
490 0 _aThe Morgan Kaufmann series in computer security
504 _aIncludes bibliographical references and index.
505 0 0 _tOverview of system and network security : a comprehensive introduction /
_rJohn Mallery --
_tA cryptography primer /
_rScott R. Ellis --
_tPreventing system intrusions /
_rMichael West --
_tGuarding against network intrusions /
_rTom Chen and Patrick J. Walsh --
_tUnix and Linux security /
_rGerald Beuchelt --
_tEliminating the security weakness of Linux and Unix operating systems /
_rMario Santana --
_tInternet security /
_rJesse Walker --
_tThe botnet problem /
_rXinyuan Wang and Daniel ramsbrock --
_tIntranet security /
_rBill Mansoor --
_tLocal area network security /
_rPramod Pandya --
_tWireless network security /
_rChunming Rong and Erdal Cayirci --
_tCellular network security /
_rPeng Liu, Thomas F. LaPorta and Kameswari Kotapati --
_tRFID security /
_rChunming Rong and Erdal Cayirci --
_tInformation security essentials for IT managers, protecting mission-critical systems /
_rAlbert Caballero --
_tSecurity management systems /
_rJoe Wright and Jim Harmening --
_tInformation technology security management /
_rRahul Bhasker and Bhushan Kapoor --
_tIdentity management /
_rJean-Marc Seigneur and Tewfiq El Malika --
_tIntrusion prevention and detection systems /
_rChristopher Day --
_tComputer forensics /
_rScott R. Ellis --
_tNetwork forensics /
_rYong Guan --
_tFirewalls /
_rErrin W. Fulp --
_tPenetration testing /
_rSanjay Bavisi --
_tWhat is vulnerability assessment? /
_rAlmantas Kakareka --
_tData encryption /
_rBhushan Kapoor and Pramod Pandya --
_tSatellite encryption /
_rDaniel S. Soper --
_tPublic key infrastructure /
_rTerence Spies --
_tInstant-messaging security /
_rSamuel J.J. Curry --
_tNET privacy /
_rMarco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --
_tPersonal privacy policies /
_rGeorge Yee and Larry Korba --
_tVirtual private networks /
_rJim Harmening and Joe Wright --
_tIdentity theft /
_rMarkus Jacobsson and Alex Tsow --
_tVoIP security /
_rDan Wing and Harsh Kupwade Patil --
_tSAN security /
_rJohn McGowan, Jeffrey Bardin and John McDonald --
_tStorage area networking devices security /
_rRobert Rounsavall --
_tRisk management /
_rSokratis K. Katsikas --
_tPhysical security essentials /
_rWilliam Stallings --
_tBiometrics /
_rLuther Martin --
_tHomeland security /
_rRahul Bhaskar and Bhushan Kapoor --
_tInformation warfare /
_rJan Eloff and Anna Granova --
_tSecurity through diversity /
_rKevin Noble --
_tReputation management /
_rJean-Marc Seigneur --
_tContent filtering /
_rPeter Nicoletti --
_tData loss protection /
_rKen Perkins --
_gAppendix A:
_tConfiguring authentication service on Microsoft Windows Vista /
_rJohn R. Vacca --
_gAppendix B:
_tSecurity management and resiliency /
_rJohn R. Vacca --
_gAppendix C:
_tList of top security implementation and deployment companies --
_gAppendix D:
_tList of security products --
_gAppendix E:
_tList of security standards --
_gAppendix F:
_tList of miscellaneous security resources --
_gAppendix G:
_tEnsuring built-in frequency hopping spread spectrum wireless network security --
_gAppendix H:
_tConfiguring wireless internet security remote access --
_gAppendix I:
_tFrequently asked questions --
_gAppendix J: Glossary.
650 0 _aComputer networks
_xSecurity measures.
_977
650 0 _aPenetration testing (Computer security)
_911344
700 1 _aVacca, John R.
_913545
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2lcc
_cBook
_06
999 _c7396
_d7396