Computer and information security handbook:
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Morgan Kaufmann
2013
|
Ausgabe: | 2. ed. |
Schriftenreihe: | The Morgan Kauffmann series in computer security
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Zusammenfassung: | This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. --from publisher description |
Beschreibung: | XXVIII, 1171 S. |
ISBN: | 9780123943972 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041086565 | ||
003 | DE-604 | ||
005 | 20131213 | ||
007 | t | ||
008 | 130613s2013 |||| 00||| eng d | ||
020 | |a 9780123943972 |c hbk |9 978-0-12-394397-2 | ||
035 | |a (OCoLC)856804578 | ||
035 | |a (DE-599)BVBBV041086565 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-91G |a DE-29T |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Computer and information security handbook |c ed. by John R. Vacca |
250 | |a 2. ed. | ||
264 | 1 | |a Waltham, MA |b Morgan Kaufmann |c 2013 | |
300 | |a XXVIII, 1171 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Morgan Kauffmann series in computer security | |
520 | 3 | |a This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. --from publisher description | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 3 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Vacca, John R. |d 1947- |e Sonstige |0 (DE-588)115294341 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-026063247 |
Datensatz im Suchindex
_version_ | 1804150460619161600 |
---|---|
adam_text | Contents
Foreword
Preface
Acknowledgments
About the Editor
Contributors
Parti
Overview of System and Network
Security: A Comprehensive
Introduction
1.
Building a Secure Organization
John Mallery
Obstacles to Security
Computers are Powerful and Complex
Current Trend is to Share, Not Protect
Security isn t about Hardware and
Software
Ten Steps to Building a Secure
Organization
Preparing for the Building of Security
Control Assessments
Summary
A Cryptography Primer
Scott R. Ellis
1.
What is Cryptography? What is
Encryption?
2.
Famous Cryptographic Devices
3.
Ciphers
4.
Modern Cryptography
5.
The Computer Age
6.
How AES Works
7.
Selecting Cryptography: the Process
8.
Summary
XIX
Chapter Review Questions/Exercises
45
XX
Exercise
46
xxv
xxvi
xxvii
3.
Detecting System Intrusions
47
Almantas
Kakareka
1.
Introduction
47
2.
Monitoring Key Files in the System
47
3.
Security Objectives
48
4.
Oday Attacks
51
5.
Good Known State
52
6.
Rootkits
53
1
7.
Low Hanging Fruit
54
8. Antivirus
Software
55
3
9.
Homegrown Intrusion Detection
55
10.
Full-Packet Capture Devices
55
11.
Out-of-Band Attack Vectors
57
3
12.
Security Awareness Training
58
3
13.
Data Correlation
58
4
14.
SI EM
59
15.
Other Weird Stuff on the System
59
6
16.
Detection
60
17.
Network-Based Detection of
8
System Intrusions (DSIs)
60
18.
Summary
61
21
Chapter Review Questions/Exercises
62
22
Exercise
62
23
References
62
24
25
Preventing System Intrusions
Michael West
63
1.
So, What is an Intrusion?
64
2.
Sobering Numbers
64
26
3.
Know Your Enemy: Hackers versus
26
Crackers
65
27
4.
Motives
66
33
5.
The Crackers Tools of the Trade
66
38
6.
Bots
67
41
7.
Symptoms of Intrusions
68
44
8.
What Can You Do?
69
45
9.
Security Policies
71
Contents
7.
10.
Risk Analysis
11.
Tools of Your Trade
12.
Controlling User Access
13.
Intrusion Prevention Capabilities
14.
Summary
Chapter Review Questions/Exercises
Exercise
Guarding Against Network
Intrusions
Thomas M. Chen and Patrick J. Walsh
1.
Traditional Reconnaissance and Attacks
2.
Malicious Software
3.
Defense in Depth
4.
Preventive Measures
5.
Intrusion Monitoring and Detection
6.
Reactive Measures
7.
Network-Based Intrusion Protection
8.
Summary
Chapter Review Questions/Exercises
Exercise
Securing Cloud Computing
Systems
Cem
Gurkok
1.
Cloud Computing Essentials:
Examining the Cloud Layers
Software as a Service (SaaS):
Managing Risks in the Cloud
Platform as a Service (PaaS):
Securing the Platform
Infrastructure as a Service (laaS)
Leveraging Provider-Specific Security
Options
Achieving Security in a Private Cloud
Meeting Compliance Requirements
Preparing for Disaster Recovery
Summary
Chapter Review Questions/Exercises
Exercise
References
Fault Tolerance and Resilience in
Cloud Computing Environments
Ravi ¡hawar and
Vincenzo
Piu
rí
1.
Introduction
2.
Cloud Computing Fault Model
72
3.
73
4.
75
77
5.
77
78
6.
78
2.
3.
4.
5.
6.
7.
8.
9.
81
81
84
86
87
91
93
94
94
94
95
97
97
103
104
107
112
113
117
120
122
122
122
123
125
125
126
8.
7.
8.
Basic Concepts on Fault Tolerance
Different Levels of Fault Tolerance in
Cloud Computing
Fault Tolerance against Crash Failures
in Cloud Computing
Fault Tolerance against Byzantine
Failures in Cloud Computing
Fault Tolerance as a Service in
Cloud Computing
Summary
Chapter Review Questions/Exercises
Exercise
Acknowledgments
References
Securing Web Applications,
Services, and Servers
Gerald Beuchelt
1.
Setting the Stage
2.
Basic Security for HTTP Applications
and Services
3.
Basic Security for SOAP Services
4.
Identity Management and Web
Services
5.
Authorization Patterns
6.
Security Considerations
7.
Challenges
8.
Summary
Chapter Review Questions/Exercises
Exercise
Unix and Linux Security
Gerald Beuchelt
128
130
131
132
134
139
139
140
140
140
143
143
144
146
149
154
155
160
160
162
162
165
1.
Unix and Security
165
2.
Basic Unix Security Overview
166
3.
Achieving Unix Security
169
4.
Protecting User Accounts and
Strengthening Authentication
170
5.
Limiting
Superuser
Privileges
173
6.
Securing Local and Network File
Systems
174
7.
Network Configuration
176
8.
Improving the Security of Linux and
Unix Systems
178
9.
Additional Resources
178
10.
Summary
180
Chapter Review Questions/Exercises
180
Exercise
181
Contents
10.
Eliminating the Security Weakness
of Linux and Unix Operating
Systems
183
Mario
Santana
1.
Introduction to Linux and Unix
183
2.
Hardening Linux and Unix
187
3.
Proactive Defense for Linux and Unix
194
4.
Summary
196
Chapter Review Questions/Exercises
196
Exercise
196
11.
Internet Security
Jesse Walker
197
1.
Internet Protocol Architecture
197
2.
An Internet Threat Model
204
3.
Defending against Attacks on the
internet
209
4.
Internet Security Checklist
221
5.
Summary
221
Chapter Review Questions/Exercises
222
Exercise
222
12.
The Botnet Problem
Daniel Ramsbrock and Xinyuan Wang
223
1.
Introduction
223
2.
Botnet Overview
224
3.
Typical
Bot Life
Cycle
226
4.
The Botnet Business Model
227
5.
Botnet Defense
228
6. Botmaster Traceback
232
7.
Preventing Botnets
235
8.
Summary
236
Chapter Review Questions/Exercises
236
Exercise
238
13.
Intranet Security
Bill
Mansoor
239
1.
Smartphones and Tablets in the
Intranet
242
2.
Security Considerations
245
3.
Plugging the Gaps: NAC and Access
Control
247
4.
Measuring Risk: Audits
248
5.
Guardian at the Gate: Authentication
and Encryption
250
6.
Wireless Network Security
250
7.
Shielding the Wire: Network Protection
251
8.
Weakest Link in Security: User Training
253
9.
Documenting the Network: Change
Management
253
10.
Rehearse the Inevitable: Disaster
Recovery
254
11.
Controlling Hazards: Physical and
Environmental Protection
256
12.
Know Your Users: Personnel Security
257
13.
Protecting Data Flow: Information and
System Integrity
258
14.
Security Assessments
258
15.
Risk Assessments
259
16.
Intranet Security Implementation
Process Checklist
260
17.
Summary
260
Chapter Review Questions/Exercises
260
Exercise
261
14.
Local Area Network Security
263
Dr.
Pramod Pandya
1.
Identify Network Threats
264
2.
Establish Network Access Controls
264
3.
Risk Assessment
265
4.
Listing Network Resources
265
5.
Threats
265
6.
Security Policies
265
7.
The Incident-Handling Process
266
8.
Secure Design Through Network
Access Controls
266
9.
IDS Defined
267
10.
NIDs: Scope and Limitations
267
11.
A Practical Illustration of NIDS
268
12.
Firewalls
270
13.
Dynamic NAT Configuration
274
14.
The Perimeter
274
15.
Access List Details
275
16.
Types of Firewalls
276
17.
Packet Filtering: IP Filtering Routers
276
18.
Application-Layer Firewalls: Proxy
Servers
276
19.
Stateful Inspection Firewalls
277
20.
NIDs Complements Firewalls
277
21.
Monitor and Analyze System Activities
277
22.
Signature Analysis
278
23.
Statistical Analysis
278
24.
Signature Algorithms
278
25.
Local Area Network Security
Countermeasures Implementation
Checklist
281
26.
Summary
281
Contents
Chapter
Review
Questions/Exercises
282
Exercise
AO¿-
15.
Wireless Network Security
285
Chunming Rong,
Gänsen
Zhao, Liang Van,
Erdal Cayirci and Hongbing Cheng
1.
Cellular Networks
286
2.
Wireless Ad hoc Networks
287
3.
Security Protocols
288
4.
WEP
288
5.
Secure Routing
291
6.
ARAN
293
7.
SLSP
293
8.
Key Establishment
294
9.
INC
295
10.
Management Countermeasures
297
11.
Summary
298
Chapter Review Questions/Exercises
298
Exercise
299
References
299
16.
Wireless Sensor Network Security
301
Harsh Kupwade
Patii
and Thomas M. Chen
1.
Introduction to the Wireless Sensor
Network (WSN)
301
2.
Threats to Privacy
304
3.
Security Measures for WSN
308
4.
Secure Routing in WSN
314
5.
Routing Classifications in WSN
314
6.
WSN Security Framework and
Standards
320
7.
Summary
320
Chapter Review Questions/Exercises
320
Exercise
321
References
321
18.
RFID Security
Chunming Rong,
Gänsen
Zhao, Liang Yan,
Erdal Cayirci and Hongbing Cheng
1.
RFID Introduction
2.
RFID Challenges
3.
RFID Protections
4.
Summary
Chapter Review Questions/Exercises
Exercise
References
19.
Optical Network Security
Lauren Collins
20.
345
345
349
353
359
359
359
360
363
1.
Optical Networks
363
2.
Securing Optical Networks
366
3.
Identifying Vulnerabilities
367
4.
Corrective Actions
368
5.
Summary
369
Chapter Review Questions/Exercises
369
Exercise
370
References
370
Optical Wireless Security
371
Scott R. Ellis
1.
Optical Wireless Systems Overview
371
2.
Deployment Architectures
372
3.
High Bandwidth
373
4.
Low Cost
373
5.
Implementation
373
6.
Surface Area
373
7.
Summary
375
Chapter Review Questions/Exercises
375
Exercise
376
17.
Cellular Network Security
Peng Liu, Thomas
F. La Porta
and
Kameswari Kotapati
1.
Introduction
2.
Overview of Cellular Networks
3.
The State of the Art of Cellular
Network Security
4.
Cellular Network Attack Taxonomy
„.,.„
5.
Cellular Network Vulnerability Analysis
334
6.
Summary
341
Chapter Review Questions/Exercises
342
Exercise
342
References
343
323
Part II
Managing Information Security
21.
Information Security Essentials
for IT Managers: Protecting
Mission-Critical Systems
323
323
326
328
Albert
Caballero
1.
2.
3.
Information Security Essentials for
IT Managers, Overview
Protecting Mission-Critical Systems
Information Security from the
Ground Up
377
379
379
385
389
Contents
4.
Security Monitoring and Effectiveness
402
5.
Summary
405
Chapter Review Questions/Exercises
406
Exercise
407
25.
22.
Security Management Systems
James T. Harmening
409
1.
Security Management System
Standards
409
2.
Training Requirements
409
3.
Principles of Information Security
410
4.
Roles and Responsibilities of Personnel
410
5.
Security Policies
410
6.
Security Controls
411
7.
Network Access
411
8.
Risk Assessment
411
9.
Incident Response
411
10.
Summary
413
Chapter Review Questions/Exercises
413
Exercise
413
23.
Policy-
d
rive
η
System Management
415
Henrik
Plate, Cataldo
Basile
and
Stefano Paraboschi
1.
Introduction
415
2.
Security and Policy-based Management
415
3.
Classification and Languages
421
4.
Controls for Enforcing Security
Policies in Distributed Systems
430
5.
Products and Technologies
435
6.
Research Projects
439
7.
Summary
445
Chapter Review Questions/Exercises
446
Exercise
446
Acknowledgments
446
References
447
24.
Information Technology Security
Management
449
Rahul
Bhaskar
and Bhushan Kapoor
1.
Information Security Management
Standards
2.
Other Organizations Involved in
Standards
3.
Information Technology Security
Aspects
450
4.
Summary
26.
449
450
454
Chapter Review Questions/Exercises
Exercise
Online Identity and User
Management Services
Tewfìq
El Maliki and Jean-Marc Seigneur
458
458
459
459
1.
Introduction
2.
Evolution of Identity Management
Requirements
459
3.
The Requirements Fulfilled by Identity
Management Technologies
463
4.
Identity Management
1.0 463
5.
Social Login and User Management
475
6.
Identity
2.0
for Mobile Users
477
7.
Summary
482
Chapter Review Questions/Exercises
482
Exercise
483
References
483
Intrusion Prevention and
Detection Systems
Christopher Day
485
1.
What is an Intrusion Anyway?
485
2.
Physical Theft
485
3.
Abuse of Privileges (The Insider
Threat)
485
4.
Unauthorized Access by Outsider
486
5. Malware
Infection
486
6.
The Role of the 0-Day
487
7.
The Rogue s Gallery: Attackers
and Motives
487
8.
A Brief Introduction to TCP/IP
488
9.
The TCP/IP Data Architecture and
Data Encapsulation
489
10.
Survey of Intrusion Detection and
Prevention Technologies
491
11.
Anti-Malware Software
492
12.
Network-Based Intrusion Detection
Systems
493
13.
Network-Based Intrusion Prevention
Systems
494
14.
Host-Based Intrusion Prevention
Systems
494
15.
Security Information Management
Systems
495
16.
Network Session Analysis
495
17.
Digital Forensics
496
18.
System Integrity Validation
496
19.
Summary
497
Chapter Review Questions/Exercises
497
Contents
27.
28.
Exercise
References
TCP/IP Packet Analysis
Pramod Pandya
1.
The Internet Model
2.
Summary
Chapter Review Questions/Exercises
Exercise
The Enemy (The Intruder s
Genesis)
29.
Firewalls (online chapter)
Dr. Errin W.
Fulp
30.
Penetration Testing
Sanjay Bavisi
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Introduction
What is Penetration Testing?
How Does Penetration Testing Differ
from an Actual Hack?
Types of Penetration Testing
Phases of Penetration Testing
Defining What s Expected
The Need for a Methodology
Penetration Testing Methodologies
Methodology in Action
Penetration Testing Risks
Liability Issues
Legal Consequences
Get Out of Jail Free Card
Penetration Testing Consultants
Required Skill Sets
Accomplishments
Hiring a Penetration Tester
498
498
499
499
511
511
512
513
Dr. Pramod Pandya
1.
Introduction
513
2.
Active Reconnaissance
514
3.
Enumeration
518
4.
Penetration and Cain Access
518
5.
Maintain Access
521
6.
Defend Network Against
Unauthorized Access
522
7.
Summary
522
Chapter Review Questions/Exercises
523
Exercise
524
525
527
527
527
528
529
530
532
532
533
533
536
536
536
537
537
538
538
538
32.
18.
Why Should a Company Hire You?
19.
Summary
Chapter Review Questions/Exercises
Exercise
539
539
540
540
31.
What is Vulnerability Assessment?
541
Aimantas Kakareka
Introduction
541
Reporting
541
The It Won t Happen to US Factor
542
Why Vulnerability Assessment?
542
Penetration Testing Versus Vulnerability
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
Chapter Review Questions/Exercises
Exercise
Assessment
Vulnerability Assessment Coal
Mapping the Network
Selecting the Right Scanners
Central Scans Versus Local Scans
Defense in Depth Strategy
Vulnerability Assessment Tools
SARA
SAINT
MBSA
Scanner Performance
Scan Verification
Scanning Cornerstones
Network Scanning Countermeasures
Vulnerability Disclosure Date
Proactive Security Versus Reactive
Security
Vulnerability Causes
DIY
Vulnerability Assessment
Summary
Security Metrics: An Introduction
and Literature Review
George O.M. Yee
542
543
543
544
545
546
546
547
547
547
547
547
547
547
548
549
550
551
551
551
552
553
1.
Introduction
553
2.
Why Security Metrics?
554
3.
The Nature of Security Metrics
555
4.
Getting Started with Security Metrics
558
5.
Metrics in Action—Towards an Intelligent
Security Dashboard
559
6.
Security Metrics in the Literature
559
7.
Summary
564
Chapter Review Questions/Exercises
565
Exercise
565
References
566
Contents
Partili
Cyber, Network, and Systems
Forensics
Security and Assurance
567
33.
Cyber Forensics
569
Scott R. Ellis
1.
What is Cyber Forensics?
569
2.
Analysis of Data
570
3.
Cyber Forensics in the Court System
572
4.
Understanding Internet History
573
5.
Temporary Restraining Orders and
Labor Disputes
574
6.
First Principles
586
7.
Hacking a Windows XP Password
586
8.
Network Analysis
588
9.
Cyber Forensics Applied
590
10.
Tracking, Inventory, Location of Files,
Paperwork, Backups, and so on
590
11.
Testifying as an Expert
592
12.
Beginning to End in Court
595
13.
Summary
598
Chapter Review Questions/Exercises
598
Exercise
599
34.
36.
Network Forensics
Yong
Cuan
1.
Scientific Overview
2.
The Principles of Network Forensics
3.
Attack Traceback and Attribution
4.
Critical Needs Analysis
5.
Research Directions
6.
Summary
Chapter Review Questions/Exercises
Exercise
Part IV
Encryption Technology
37.
Data Encryption
649
649
649
651
656
657
658
660
660
661
663
Cyber Forensics and Incident
Response
Cem
Gurkok
1.
Introduction to Cyber Forensics
2.
Handling Preliminary Investigations
3.
Controlling an Investigation
4.
Conducting Disk-Based Analysis
5.
Investigating Information-Hiding
Techniques
6.
Scrutinizing Email
7.
Validating Email Header Information
8.
Tracing Internet Access
9.
Searching Memory in Real Time
10.
Summary
Chapter Review Questions/Exercises
Exercise
References
35.
Securing e-Discovery
Scott R. Ellis
1.
Information Management
2.
Legal and Regulatory Obligation
3.
Summary
Chapter Review Questions/Exercises
Exercise
601
601
602
604
605
608
611
612
613
615
620
620
621
621
623
625
626
647
648
648
Dr. Bhushan Kapoor and Dr. Pramod Pandya
1.
Need for Cryptography
663
2.
Mathematical Prelude to Cryptography
664
3.
Classical Cryptography
664
4.
Modern Symmetric Ciphers
667
5.
Algebraic Structure
669
6.
The Internal Functions of Rijndael in
AES Implementation
672
7.
Use of Modern Block Ciphers
676
8.
Public-Key Cryptography
677
9.
Cryptanalysis of RSA
680
10.
Diffie-Hellman Algorithm
681
11.
Elliptic Curve Cryptosystems
682
12.
Message Integrity and Authentication
683
13.
Triple Data Encryption Algorithm
(TDEA) Block Cipher
685
14.
Summary
686
Chapter Review Questions/Exercises
686
Exercise
686
References
687
38.
Satellite Encryption
689
Daniel S. Soper
1.
Introduction
689
2.
The Need for Satellite Encryption
690
3.
Implementing Satellite Encryption
691
4.
Pirate Decryption of Satellite
Transmissions
695
5.
Satellite Encryption Policy
697
6.
Satellite Encryption Service
698
7.
The Future of Satellite Encryption
699
8.
Summary
699
Chapter Review Questions/Exercises
700
Exercise
701
Contents
39. Public Key
Infrastructure
(online
chapter)
703
Terence Spies
40.
Password-based Authenticated
Key Establishment Protocols
705
Jean Lancrenon,
Dalia
Khader, Peter Y.A. Ryan
and Feng Hao
1.
Introduction to Key Exchange
705
2.
Password-Authenticated Key Exchange
709
3.
Concrete Protocols
711
4.
Summary
718
Chapter Review Questions/Exercises
718
Exercise
719
References
719
Exercise
References
751
751
41.
Instant-Messaging Security
721
Samuel J.J. Curry
1.
Why Should
1
Care about Instant
Messaging?
721
2.
What is Instant Messaging?
721
3.
The Evolution of Networking
Technologies
722
4.
Game Theory and Instant Messaging
723
5.
The Nature of the Threat
725
6.
Common
IM
Applications
729
7.
Defensive Strategies
730
8.
Instant-Messaging Security Maturity
and Solutions
730
9.
Processes
732
10.
Summary
732
Chapter Review Questions/Exercises
734
Exercise
735
PartV
Privacy and Access Management
737
42.
Privacy on the Internet
739
Marco Cremonini, Chiara Braghin
and
Claudio Agostino Ardagna
1.
Privacy in the Digital Society
739
2.
The Economics of Privacy
742
3.
Privacy-Enhancing Technologies
744
4.
Network Anonymity
747
5.
Summary
750
Chapter Review Questions/Exercises
750
43.
Privacy-Enhancing Technologies
755
Simone
Fischer-Hbner and Stefan
Berthold
1.
The Concept of Privacy
755
2.
Legal Privacy Principles
756
3.
Classification of PETs
757
4.
Traditional Privacy Coals of PETs
758
5.
Privacy Metrics
758
6.
Data Minimization Technologies
760
7.
Transparency-Enhancing Tools
767
8.
Summary
770
Chapter Review Questions/Exercises
770
Exercise
771
References
771
44.
Personal Privacy Policies
773
George O.M. Yee and Larry
Korba
1.
Introduction
773
2.
Content of Personal Privacy Policies
774
3.
Semiautomated Derivation of Personal
Privacy Policies
776
4.
Specifying Well-Formed Personal
Privacy Policies
779
5.
Preventing Unexpected Negative
Outcomes
782
6.
The Privacy Management Model
784
7.
Discussion and Related Work
788
8.
Summary
791
Chapter Review Questions/Exercises
791
Exercise
792
45.
Detection of Conflicts in
Security Policies
Cataldo
Basile, Matteo
Maria Casalino,
Simone
Mutti
and
Stefano Paraboschi
793
ι.
2.
3.
4.
5.
6.
Introduction
793
Conflicts in Security Policies
793
Conflicts in Executable Security Policies
797
Conflicts in Network Security Policies
800
Query-Based Conflict Detection
801
Semantic Web Technology for Conflict
Detection
807
7.
Summary
810
Chapter Review Questions/Exercises
810
Exercise
811
Acknowledgments
811
References
811
Contents
46.
Supporting User Privacy Preferences
in Digital Interactions
813
Sara
Foresti
and
Pierangela Samarati
1.
Introduction
813
2.
Basic Concepts and Desiderata
814
3.
Cost-Sensitive Trust Negotiation
818
4.
Point-Based Trust Management
820
5.
Logical-Based Minimal Credential
Disclosure
822
6.
Privacy Preferences in Credential-
Based Interactions
825
10.
Mobile VPN
865
11.
VPN Deployments
865
12.
Summary
866
Chapter Review Questions/Exercises
866
Exercise
867
Resources
867
49.
Identity Theft (online chapter)
Markus Jakobsson
and
Alex Tsow
869
7.
Fine-Grained Disclosure of Sensitive
50.
VoIP Security
871
Access Policies
8.
Open Issues
829
832
Harsh Kupwade
Patii,
Dan Wing and
Thomas M. Chen
9.
Summary
832
Chapter Review Questions/Exercises
832
1.
Introduction
871
Exercise
833
2.
Overview of Threats
873
Acknowledgments
833
3.
Security in VoIP
878
References
833
4.
Future Trends
880
5.
Summary
884
Chapter Review Questions/Exercises
885
47.
Privacy and Security in Environmental
Exercise
886
Monitoring Systems: Issues and
Solutions
835
Sabrina De
Capitani di Vimercati, Angelo
Part VI
Genovese, Giovanni Livraga, Vincenzo Piun
í
Storage Security
887
and Fabio Scotti
1.
Introduction
835
51.
SAN Security (online chapter)
889
2.
System
Architectures
836
John McGowan, Jeffrey Bardin and
3.
Environmental Data
838
John McDonald
4.
Security and
Privacy
Issues in
Environmental
Monitoring
839
5.
Countermeasures
841
52.
Storage Area Networking Security
6.
Summary
850
Devices
891
Chapter Review
Questions/Exercises
Exercise
850
851
Robert Rounsavall
Acknowledgments
851
1.
What is a SAN?
891
References
851
2.
San Deployment Justifications
891
3.
The Critical Reasons for SAN Security
892
48.
Virtual Private Networks
855
4.
SAN Architecture and Components
5.
SAN General Threats and Issues
893
894
James T. Harmening
6.
Summary
903
Chapter Review Questions/Exercises
903
1.
History
856
Exercise
904
2.
Who is in Charge?
859
3.
VPN Types
860
4.
Authentication Methods
863
53.
Risk Management
905
5.
Symmetric Encryption
863
Sokratis K. Katsikas
6.
Asymmetric Cryptography
864
7.
Edge Devices
864
1.
The Concept of Risk
906
8.
Passwords
864
2.
Expressing and Measuring Risk
906
9.
Hackers and Crackers
865
3.
The Risk Management Methodology
909
Contents
4.
Risk
Management
Laws and
Regulations
921
5.
Risk Management Standards
924
6.
Summary
926
Chapter Review Questions/Exercises
926
Exercise
927
Part
VII
Physical Security
929
54.
Physical Security Essentials
931
William Stallings
1.
Overview
931
2.
Physical Security Threats
932
3.
Physical Security Prevention and
Mitigation Measures
936
4.
Recovery from Physical Security
Breaches
938
5.
Threat Assessment, Planning, and
Plan Implementation
938
6.
Example: A Corporate Physical
Security Policy
939
7.
Integration of Physical and
Logical Security
939
8.
Physical Security Checklist
945
9.
Summary
945
Chapter Review Questions/Exercises
945
Exercise
945
57.
Homeland Security
(online chapter)
Rahul
Bhaskar
and Bhushan Kapoor
58.
Cyber Warfare
Anna Granova and Marco Slaviero
1.
Cyber Warfare Model
2.
Cyber Warfare Defined
3.
CW: Myth or Reality?
4.
Cyber Warfare: Making CW Possible
5.
Legal Aspects of CW
6.
Holistic View of Cyber Warfare
7.
Summary
Chapter Review Questions/Exercises
Exercise
973
975
975
976
977
979
985
989
989
989
990
Part
VIII
Practical Security
991
59.
System Security
993
Lauren Collins
1.
Foundations of Security
993
2.
Basic Countermeasures
997
3.
Summary
999
Chapter Review Questions/Exercises
1000
Exercise
1000
55.
Disaster Recovery
Scott R. Ellis and Lauren Collins
947
1.
Introduction
947
2.
Measuring Risk and Avoiding Disaster
947
3.
The Business Impact Assessment
(BIA)
949
4.
Summary
954
Chapter Review Questions/Exercises
954
Exercise
955
60.
Securing the Infrastructure
Lauren Collins
1.
Communication Security Coals
2.
Attacks and Countermeasures
3.
Summary
Chapter Review Questions/Exercises
Exercise
1001
1001
1008
1011
1012
1013
56.
Biometrics
957
Luther Martin
1.
Relevant Standards
958
2.
Biometrie
System Architecture
958
3.
Using
Biometrie
Systems
965
4.
Security Considerations
967
5.
Summary
971
Chapter Review Questions/Exercises
971
Exercise
971
Access Controls
1015
Lauren Collins
1.
Infrastructure Weaknesses:
DAC,
MAC, and RBAC
1015
2.
Strengthening the Infrastructure:
Authentication Systems
1018
3.
Summary
1020
Chapter Review Questions/Exercises
1021
Exercise
1021
Contents
62.
Assessments and Audits
Lauren Collins
1.
Assessing Vulnerabilities and Risk:
Penetration Testing and Vulnerability
Assessments
2.
Risk Management: Quantitative Risk
Measurements
3.
Summary
Chapter Review Questions/Exercises
Exercise
023
5.
Overview of Current Online
Reputation Service
1063
6.
Summary
1070
Chapter Review Questions/Exercises
1071
Exercise
1071
1023
Bibliography
1072
1027
1028
66.
Content Filtering (online chapter)
1073
1030
1030
Pere Nicoletti
63.
Fundamentals of Cryptography
1031 67
Scott R. Ellis
1.
Assuring Privacy with Encryption
2.
Summary
Chapter Review Questions/Exercises
Exercise
Part IX
Advanced Security
64.
Security Through Diversity
Kevin Noble
Data Loss Protection
1075
Ubiquity
Example Attacks Against Uniformity
Attacking Ubiquity with
Antivirus
Tools
The Threat of Worms
Automated Network Defense
Diversity and the Browser
Sandboxing and Visualization
DNS Example of Diversity Through
Security
Recovery from Disaster is Survival
Summary
Ken
Perkins
1031
1.
Precursors of DLP
1076
1037
2.
What is DLP?
1077
1037
3.
Where to Begin?
1082
1038
4.
Data is Like Water
1082
5.
You Don t Know What You Don t
Know
1084
6.
How Do DLP Applications Work?
1085
)39
7.
Eat Your Vegetables
1086
8.
IT s a Family Affair, Not Just IT
041
Security s Problem
1089
9.
Vendors, Vendors Everywhere!
Who do you Believe?
1089
1042
10.
Summary
1090
1043
Chapter Review Questions/Exercises
1091
Exercise
1091
1044
1044
1046
1047
1048
1048
1049
1049
1050
1051
Satellite Cyber Attack Search
and Destroy
1093
Jeffrey Bardin
1.
Hacks, Interference, and Jamming
1093
2.
Summary
1100
Chapter Review Questions/Exercises
1100
Exercise
1101
References
1101
65.
Online
е
-Reputation Management
Services
1053
Jean-Marc Seigneur
1.
Introduction
2.
The Human Notion of Reputation
3.
Reputation Applied to the
Computing World
4.
State of the Art of Attack- Resistant
Reputation Computation
69.
Verifiable Voting Systems
Thea
Peacock, Peter Y.A. Ryan,
Steve Schneider and Zhe Xia
1053
1.
Introduction
1054
2.
Security Requirements
3.
Verifiable Voting Schemes
1056
4.
Building Blocks
5.
Survey of Noteworthy Schemes
1059
6.
Threats to Verifiable Voting Systems
1103
1103
1103
1105
1106
1113
1121
Contents
70.
7.
Summary
Chapter Review Questions/Exercises
Exercise
References
Advanced Data Encryption
Pramod Pandya
1.
Mathematical Concepts Reviewed
2.
The RSA Cryptosystem
1121
1122
1123
1123
1127
Index
1127
1131
3.
Summary
Chapter Review Questions/Exercises
Exercise
References
1136
1136
1138
1138
1139
Online Chapters and Appendices
29.
Firewalls
Dr. Errin W.
Fulp
e1
1.
Introduction e1
2.
Network Firewalls e1
3.
Firewall Security Policies e2
4.
A Simple Mathematical Model for
Policies, Rules, and Packets
еЗ
5.
First-Match Firewall Policy Anomalies e4
6.
Policy Optimization e5
7.
Firewall Types
е6
8.
Host and Network Firewalls e7
9.
Software and Hardware Firewall
Implementations e7
10.
Choosing the Correct Firewall e8
11.
Firewall Placement and Network
Topology e8
12.
Firewall Installation and Configuration e10
13.
Supporting Outgoing Services Through
Firewall Configuration e11
14.
Secure External Services Provisioning e12
15.
Network Firewalls for Voice and Video
Applications e12
16.
Firewalls and Important Administrative
Service Protocols e13
17.
Internal IP Services Protection e15
18.
Firewall Remote Access Configuration e16
19.
Load Balancing and Firewall Arrays e16
20.
Highly Available Firewalls e18
21.
Firewall Management
22.
Summary
Chapter Review Questions/Exercises
Exercise
39.
Public Key Infrastructure
e18
e19
e19
e20
e21
Terence Spies
1.
Cryptographic Background
e21
2.
Overview of PKI
e23
3.
The X.509 Model
e24
4.
X.509 Implementation Architectures
e25
5.
X.509 Certificate Validation
е26
6.
X.509 Certificate Revocation
е28
7.
Server-Based Certificate Validity
Protocol
е29
8.
X.509 Bridge Certification Systems
еЗО
9.
X.509 Certificate Format
е31
10.
PKI Policy Description
е34
11.
PKI Standards Organizations
е34
12.
PGP Certificate Formats
е35
13.
PGP PKI Implementations
еЗб
14.
W3C
еЗб
15.
Is PKI Secure?
еЗб
16.
Alternative PKI Architectures
е37
17.
Modified X.509 Architectures
е37
18.
Alternative Key Management Models
е38
19.
Summary
е38
Chapter Review Questions/Exercises
е39
Exercise
е40
References
е40
Contents
49.
Identity Theft e41
66.
Content Filtering e101
Markus Jakobsson
and Alex Tsow pete Nkoletti, CISSP,
CISA, CCSK
51.
1.
Experimental Design
e42
1.
Defining the Problem
e101
2.
Results and Analysis
e48
2.
Why Content Filtering is Important
e102
3.
Implications for
Crimeware
e57
3.
Content Categorization Technologies
e104
Summary
e58
4.
Perimeter Hardware and Software
Chapter Review Questions/Exercises
е59
Solutions
e106
Exercise
ебО
5.
Categories
e110
6.
Legal Issues
e110
7.
Circumventing Content Filtering
e114
SAN Security
е61
8.
Additional Items to Consider:
John McGowan, Jeffrey Bardin and John
9.
Overblocking and Underblocking
Related Products
e117
e119
McDonald
10.
Summary
e120
1.
Organizational Structure
е61
Chapter Review
Questions/Exercises
e121
2.
Access Control Lists
(АСІ)
and policies
ебЗ
Exercise
e121
3.
Physical Access
е64
4.
Change Management
5.
Password Policies
е64
е65
Appendix
A Configuring
6.
Defense in Depth
е65
Authentication Service
7.
Vendor Security Review
е65
on Microsoft Windows
7
e125
8.
Data Classification
е65
9.
Security Management
е65
10.
Auditing
ебб
Appendix
В
Security Management
11.
Security Maintenance
ебб
and Resiliency
e129
12.
Host Access: Partitioning
е67
13.
Data Protection: Replicas
ебб
14.
Encryption in Storage
е71
Appendix
С
List of Top Security
15.
Application of Encryption
е73
Implementation
16.
Summary
Chapter Review Questions/Exercises
Exercise
е81
е82
е83
and Deployment
Companies
e131
References
е83
Appendix
D
List of Security
57.
Homeland Security e85 Products e135
Rahul
Bhaskar,
Ph.D. and Bhushan Kapoor
1.
Statutory Authorities e85 Appendix
E
List of Security
2.
Homeland Security Presidential Standards e139
Directives e91
3.
Organizational Actions e92
4.
Summary e94 Appendix
F
List of Miscellaneous
chapter Review Questions/Exercises e98 Security Resources e141
Exercise e99
Contents
Appendix C Ensuring Built-in
Frequency Hopping
Spread Spectrum
Wireless Network
Security e149
Appendix
H
Configuring Wireless
Internet Security
Remote Access e151
Appendix I Frequently Asked
Questions e155
Appendix
J
Case Studies
e157
Appendix
К
Answers To Review
Questions/Exercises,
Hands-On Projects,
Case Projects And
Optional Team Case
Project By Chapter
Appendix
L
Glossary
e173
e245
NEW FOR THE SECOND EDITION
•
Expanded coverage of security for new technologies
•
Review questions, exercises, hands-on projects, and case
projects for individual students and for groups of students
studying in a cohort environment
•
case studies illustrating actual implementation scenarios of
the principles and requirements discussed in the text
•
Chapter summaries and learning checklists
•
Test bank, instructor s manual, lecture slides, case study
questions, and more
The second edition of the Computer and
information
Security
Handbook provides the most complete and concise view of com¬
puter security and privacy available today in one volume. It offers
in-depth coverage of computer security theory, technology, and
practice as they relate to established technologies as well as recent
advancements. It explores practical solutions to a wide range of
security issues.
The book is organized into ten parts composed of
70
contributed
chapters by leading experts in the areas of networking and systems
security; information management; cyber warfare and security;
encryption technology; privacy; data storage; physical security; and
a host of advanced security topics. New to this edition are chapters
on intrusion detection, securing the cloud, securing web apps,
ethical hacking, cyber forensics, physical security, disaster recovery,
cyber attack deterrence, and more,
|
any_adam_object | 1 |
author_GND | (DE-588)115294341 |
building | Verbundindex |
bvnumber | BV041086565 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 461f DAT 050f |
ctrlnum | (OCoLC)856804578 (DE-599)BVBBV041086565 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03177nam a2200589 c 4500</leader><controlfield tag="001">BV041086565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131213 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130613s2013 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123943972</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-12-394397-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)856804578</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041086565</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer and information security handbook</subfield><subfield code="c">ed. by John R. Vacca</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 1171 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Morgan Kauffmann series in computer security</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. --from publisher description</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vacca, John R.</subfield><subfield code="d">1947-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)115294341</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026063247</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV041086565 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:39:17Z |
institution | BVB |
isbn | 9780123943972 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026063247 |
oclc_num | 856804578 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-29T DE-739 |
owner_facet | DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-29T DE-739 |
physical | XXVIII, 1171 S. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Morgan Kaufmann |
record_format | marc |
series2 | The Morgan Kauffmann series in computer security |
spelling | Computer and information security handbook ed. by John R. Vacca 2. ed. Waltham, MA Morgan Kaufmann 2013 XXVIII, 1171 S. txt rdacontent n rdamedia nc rdacarrier The Morgan Kauffmann series in computer security This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. --from publisher description Computer networks / Security measures Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Datensicherung (DE-588)4011144-1 s Rechnernetz (DE-588)4070085-9 s Informationssystem (DE-588)4072806-7 s Vacca, John R. 1947- Sonstige (DE-588)115294341 oth Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Computer and information security handbook Computer networks / Security measures Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4072806-7 (DE-588)4070085-9 (DE-588)4143413-4 |
title | Computer and information security handbook |
title_auth | Computer and information security handbook |
title_exact_search | Computer and information security handbook |
title_full | Computer and information security handbook ed. by John R. Vacca |
title_fullStr | Computer and information security handbook ed. by John R. Vacca |
title_full_unstemmed | Computer and information security handbook ed. by John R. Vacca |
title_short | Computer and information security handbook |
title_sort | computer and information security handbook |
topic | Computer networks / Security measures Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks / Security measures Computer networks Security measures Computersicherheit Datensicherung Informationssystem Rechnernetz Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026063247&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT vaccajohnr computerandinformationsecurityhandbook |