Amazon cover image
Image from Amazon.com

Computer and information security handbook / edited by John R. Vacca.

By: Contributor(s): Material type: TextTextPublisher: Cambridge, MA : Morgan Kaufmann Publishers, an imprint of Elsevier, [2017]Copyright date: �2017Edition: Third editionDescription: xli, 1237 pages : illustrations ; 28 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780128038437
  • 0128038438
Subject(s): Genre/Form: Additional physical formats: ebook version :: No titleLOC classification:
  • QA76.9.A25 C627 2017
Online resources:
Contents:
Part I. Overview of system and network security: a comprehensive introduction -- 1. Information security in the modern world / James Pooley -- 2. Building a secure organization / John R. Mallery -- 3. A cryptography primer / Scott R. Ellis -- 4. Verifying user and host identity / Keith Lewis -- 5. Detecting system intrusions / Scott R. Ellis -- 6. Intrusion detection in contemporary environments / Tarfa Hamed, Rozita Dara, Stefan C. Kremer -- 7. Preventing systems intrusions / Michael A. West -- 8. Guarding against network intrusions / Thomas M. Chen -- 9. Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- 10. Securing web applications, services, and servers / Gerald Beuchelt -- 11. UNIX and Linux security / Gerald Beuchelt -- 12. Eliminating security weakness of Linux and UNIX operating systems / Mario Santana -- 13. Internet security / Jesse Walker -- 14. The botnet problem / Nailah Mims -- 15. Intranet security / Bill Mansoor -- 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi -- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis -- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini -- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso -- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis -- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya.
Summary: This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- Adapted from publisher's description.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books GSU Library Epoch General Stacks QH769VAC (Browse shelf(Opens below)) 1 Available 50000003985
Books Books GSU Library Epoch General Stacks QH769VAC (Browse shelf(Opens below)) 2 Available 50000003978

Includes bibliographical references and index.

Part I. Overview of system and network security: a comprehensive introduction -- 1. Information security in the modern world / James Pooley -- 2. Building a secure organization / John R. Mallery -- 3. A cryptography primer / Scott R. Ellis -- 4. Verifying user and host identity / Keith Lewis -- 5. Detecting system intrusions / Scott R. Ellis -- 6. Intrusion detection in contemporary environments / Tarfa Hamed, Rozita Dara, Stefan C. Kremer -- 7. Preventing systems intrusions / Michael A. West -- 8. Guarding against network intrusions / Thomas M. Chen -- 9. Fault tolerance and resilience in cloud computing environments / Ravi Jhawar, Vincenzo Piuri -- 10. Securing web applications, services, and servers / Gerald Beuchelt -- 11. UNIX and Linux security / Gerald Beuchelt -- 12. Eliminating security weakness of Linux and UNIX operating systems / Mario Santana -- 13. Internet security / Jesse Walker -- 14. The botnet problem / Nailah Mims -- 15. Intranet security / Bill Mansoor -- 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi -- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis -- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini -- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso -- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis -- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya.

This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- Adapted from publisher's description.

There are no comments on this title.

to post a comment.
Share