,

Computer and Information Security Handbook

Gebonden Engels 2017 9780128038437
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.

Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.

Online chapters can also be found on the book companion website:

https://www.elsevier.com/books-and-journals/book-companion/9780128038437

Specificaties

ISBN13:9780128038437
Taal:Engels
Bindwijze:Gebonden

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>1. Information Security in the Modern Enterprise<br>2. Building a Secure Organization<br>3. A Cryptography Primer<br>4. Verifying User and Host Identity<br>5. Detecting System Intrusions<br>6. Intrusion Detection in Contemporary Environments<br>7. Preventing System Intrusions<br>8. Guarding Against Network Intrusions<br>9. Fault Tolerance and Resilience in Cloud Computing Environments<br>10. Securing Web Applications, Services and Servers<br>11. Unix and Linux Security<br>12. Eliminating the Security Weakness of Linux and Unix Operating Systems<br>13. Internet Security<br>14. The Botnet Problem<br>15. Intranet Security<br>16. Wireless Network Security<br>17. Wireless Sensor Network Security<br>18. Security for the Internet of Things<br>19. Cellular Network Security<br>20. RFID Security<br>21. Information Security Essentials for IT Managers, Protecting Mission-Critical Systems<br>22. Security Management Systems<br>23. Policy-Driven System Management<br>24. Social Engineering Deceptions and Defenses <br>25. Ethical Hacking <br>26. What Is Vulnerability Assessment?<br>27. Security Education, Training, and Awareness<br>28. Risk Management<br>29. Insider Threats<br>30. Disaster Recovery<br>31. Disaster Recovery Plans for Small and Medium Business (SMB)<br>32. Security Certification And Standards Implementation<br>33. Security Policies And Plans Development <br>34. Cyber Forensics<br>35. Cyber Forensics and Incident Response<br>36. Securing eDiscovery<br>37. Microsoft Office and Metadata Forensics: A Deeper Dive<br>38. Hard Drive Imaging<br>39. Satellite Encryption<br>40. Public Key Infrastructure<br>41. Context-Aware Multi-Factor Authentication<br>42. Instant-Messaging Security<br>43. Online Privacy<br>44. Privacy-enhancing Technologies<br>45. Detection Of Conflicts In Security Policies<br>46. Supporting User Privacy Preferences in Digital Interactions<br>47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions<br>48. Virtual Private Networks<br>49. VoIP Security<br>50. Storage Area Networking Devices Security<br>51. Securing Cloud Computing Systems<br>52. Cloud Security<br>53. Private Cloud Security<br>54. Virtual Private Cloud Security<br>55. Protecting Virtual Infrastructure<br>56. SDN and NFV Security<br>57. Physical Security Essentials<br>58. Online Identity and User Management Services<br>59. Intrusion Prevention and Detection Systems<br>60. Penetration Testing<br>61. Access Controls<br>62. Endpoint Security<br>63. Fundamentals of Cryptography<br>64. Securing the Infrastructure<br>65. Cyber Warfare<br>66. Security Through Diversity<br>67. Online e-Reputation Management Services<br>68. Data Loss Protection<br>69. Satellite Cyber Attack Search and Destroy<br>70. Advanced Data Encryption<br>Appendices (Online only)</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Computer and Information Security Handbook