Computer and information security handbook /:
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston : Burlington, MA :
Elsevier ; Morgan Kaufmann,
©2009.
|
Schriftenreihe: | Morgan Kaufmann series in computer security.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 DE-862 DE-863 |
Zusammenfassung: | This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. & nbsp;Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. |
Beschreibung: | 1 online resource (xxxii, 844 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080921945 0080921949 0123743540 9780123743541 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn429898404 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 090810s2009 ne a ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OPELS |d N$T |d OCLCQ |d IDEBK |d OCLCQ |d OPELS |d OCLCQ |d B24X7 |d OSU |d EBLCP |d COO |d CNCGM |d E7B |d DKDLA |d ALAUL |d OCLCQ |d DEBSZ |d ZAD |d OCLCQ |d OCLCF |d YDXCP |d UKDOC |d OCLCQ |d S3O |d OCLCQ |d ICA |d FEM |d AGLDB |d OCLCE |d OTZ |d OCLCQ |d VTS |d CUY |d MERUC |d ZCU |d ICG |d OCLCA |d OCLCQ |d VT2 |d STF |d DKC |d OCLCQ |d LUN |d UKCRE |d AJS |d OCLCQ |d OCLCO |d OCLCQ |d INARC |d OCLCO |d OCLCL | ||
015 | |a GBA938836 |2 bnb | ||
016 | 7 | |a 015116339 |2 Uk | |
019 | |a 458273793 |a 605705457 |a 647821738 |a 741343985 |a 769362626 |a 771282247 |a 815781925 |a 823121010 |a 823842388 |a 823910192 |a 824098700 |a 824153881 |a 968060998 |a 969060040 |a 980601249 |a 994922161 |a 1081288561 |a 1107341409 |a 1129352098 |a 1153055056 |a 1192342909 |a 1228567262 |a 1240509232 |a 1391280079 | ||
020 | |a 9780080921945 |q (electronic bk.) | ||
020 | |a 0080921949 |q (electronic bk.) | ||
020 | |a 0123743540 | ||
020 | |a 9780123743541 | ||
020 | |z 9780123743541 | ||
024 | 8 | |a 9786612168703 | |
035 | |a (OCoLC)429898404 |z (OCoLC)458273793 |z (OCoLC)605705457 |z (OCoLC)647821738 |z (OCoLC)741343985 |z (OCoLC)769362626 |z (OCoLC)771282247 |z (OCoLC)815781925 |z (OCoLC)823121010 |z (OCoLC)823842388 |z (OCoLC)823910192 |z (OCoLC)824098700 |z (OCoLC)824153881 |z (OCoLC)968060998 |z (OCoLC)969060040 |z (OCoLC)980601249 |z (OCoLC)994922161 |z (OCoLC)1081288561 |z (OCoLC)1107341409 |z (OCoLC)1129352098 |z (OCoLC)1153055056 |z (OCoLC)1192342909 |z (OCoLC)1228567262 |z (OCoLC)1240509232 |z (OCoLC)1391280079 | ||
042 | |a dlr | ||
050 | 4 | |a QA76.9.A25 |b .C66 2009eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
084 | |a ST 276 |2 rvk | ||
084 | |a ST 277 |2 rvk | ||
049 | |a MAIN | ||
245 | 0 | 0 | |a Computer and information security handbook / |c edited by John R. Vacca. |
260 | |a Amsterdam ; |a Boston : |b Elsevier ; |a Burlington, MA : |b Morgan Kaufmann, |c ©2009. | ||
300 | |a 1 online resource (xxxii, 844 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a The Morgan Kaufmann series in computer security | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Building a secure organization / |r John Mallery -- |t A cryptography primer / |r Scott R. Ellis -- |t Preventing system intrusions / |r Michael West -- |t Guarding against network intrusions / |r Tom Chen and Patrick J. Walsh -- |t Unix and Linux security / |r Gerald Beuchelt -- |t Eliminating the security weakness of Linux and Unix operating systems / |r Mario Santana -- |t Internet security / |r Jesse Walker -- |t The botnet problem / |r Xinyuan Wang and Daniel ramsbrock -- |t Intranet security / |r Bill Mansoor -- |t Local area network security / |r Pramod Pandya -- |t Wireless network security / |r Chunming Rong and Erdal Cayirci -- |t Cellular network security / |r Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- |t RFID security / |r Chunming Rong and Erdal Cayirci -- |t Information security essentials for IT managers, protecting mission-critical systems / |r Albert Caballero -- |t Security management systems / |r Joe Wright and Jim Harmening -- |t Information technology security management / |r Rahul Bhasker and Bhushan Kapoor -- |t Identity management / |r Jean-Marc Seigneur and Tewfiq El Malika -- |t Intrusion prevention and detection systems / |r Christopher Day -- |t Computer forensics / |r Scott R. Ellis -- |t Network forensics / |r Yong Guan -- |t Firewalls / |r Errin W. Fulp -- |t Penetration testing / |r Sanjay Bavisi -- |t What is vulnerability assessment? / |r Almantas Kakareka -- |t Data encryption / |r Bhushan Kapoor and Pramod Pandya -- |t Satellite encryption / |r Daniel S. Soper -- |t Public key infrastructure / |r Terence Spies -- |t Instant-messaging security / |r Samuel J.J. Curry -- |t NET privacy / |r Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- |t Personal privacy policies / |r George Yee and Larry Korba -- |t Virtual private networks / |r Jim Harmening and Joe Wright -- |t Identity theft / |r Markus Jacobsson and Alex Tsow -- |t VoIP security / |r Dan Wing and Harsh Kupwade Patil -- |t SAN security / |r John McGowan, Jeffrey Bardin and John McDonald -- |t Storage area networking devices security / |r Robert Rounsavall -- |t Risk management / |r Sokratis K. Katsikas -- |t Physical security essentials / |r William Stallings -- |t Biometrics / |r Luther Martin -- |t Homeland security / |r Rahul Bhaskar and Bhushan Kapoor -- |t Information warfare / |r Jan Eloff and Anna Granova -- |t Security through diversity / |r Kevin Noble -- |t Reputation management / |r Jean-Marc Seigneur -- |t Content filtering / |r Peter Nicoletti -- |t Data loss protection / |r Ken Perkins -- |g Appendix A: |t Configuring authentication service on Microsoft Windows Vista / |r John R. Vacca -- |g Appendix B: |t Security management and resiliency / |r John R. Vacca -- |g Appendix C: |t List of top security implementation and deployment companies -- |g Appendix D: |t List of security products -- |g Appendix E: |t List of security standards -- |g Appendix F: |t List of miscellaneous security resources -- |g Appendix G: |t Ensuring built-in frequency hopping spread spectrum wireless network security -- |g Appendix H: |t Configuring wireless internet security remote access -- |g Appendix I: |t Frequently asked questions -- |g Appendix J: Glossary. |
520 | |a This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. & nbsp;Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. | ||
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2011. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2011 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Sécurité informatique. |2 eclas | |
650 | 7 | |a Manuels. |2 eclas | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Datensicherung |2 gnd | |
650 | 7 | |a Informationssystem |2 gnd |0 http://d-nb.info/gnd/4072806-7 | |
650 | 7 | |a Rechnernetz |2 gnd |0 http://d-nb.info/gnd/4070085-9 | |
653 | 0 | |a Computer networks |a Security measures | |
655 | 7 | |a Aufsatzsammlung. |2 swd | |
700 | 1 | |a Vacca, John R. |0 http://id.loc.gov/authorities/names/n91039772 | |
758 | |i has work: |a Computer and information security handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH9qRGy3B6CxWfqT8HHMrm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Computer and information security handbook. |d Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, ©2009 |z 9780123743541 |w (OCoLC)299240534 |
830 | 0 | |a Morgan Kaufmann series in computer security. |0 http://id.loc.gov/authorities/names/no2007139011 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=248988 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=248988 |3 Volltext |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780123743541 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780123743541 |3 Volltext |
938 | |a 123Library |b 123L |n 41940 | ||
938 | |a Books 24x7 |b B247 |n bks00032165 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL453166 | ||
938 | |a EBSCOhost |b EBSC |n 248988 | ||
938 | |a YBP Library Services |b YANK |n 3057010 | ||
938 | |a Internet Archive |b INAR |n computerinformat0000unse_y3h5 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn429898404 |
---|---|
_version_ | 1829094645089435648 |
adam_text | |
any_adam_object | |
author2 | Vacca, John R. |
author2_role | |
author2_variant | j r v jr jrv |
author_GND | http://id.loc.gov/authorities/names/n91039772 |
author_additional | John Mallery -- Scott R. Ellis -- Michael West -- Tom Chen and Patrick J. Walsh -- Gerald Beuchelt -- Mario Santana -- Jesse Walker -- Xinyuan Wang and Daniel ramsbrock -- Bill Mansoor -- Pramod Pandya -- Chunming Rong and Erdal Cayirci -- Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- Albert Caballero -- Joe Wright and Jim Harmening -- Rahul Bhasker and Bhushan Kapoor -- Jean-Marc Seigneur and Tewfiq El Malika -- Christopher Day -- Yong Guan -- Errin W. Fulp -- Sanjay Bavisi -- Almantas Kakareka -- Bhushan Kapoor and Pramod Pandya -- Daniel S. Soper -- Terence Spies -- Samuel J.J. Curry -- Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- George Yee and Larry Korba -- Jim Harmening and Joe Wright -- Markus Jacobsson and Alex Tsow -- Dan Wing and Harsh Kupwade Patil -- John McGowan, Jeffrey Bardin and John McDonald -- Robert Rounsavall -- Sokratis K. Katsikas -- William Stallings -- Luther Martin -- Rahul Bhaskar and Bhushan Kapoor -- Jan Eloff and Anna Granova -- Kevin Noble -- Jean-Marc Seigneur -- Peter Nicoletti -- Ken Perkins -- John R. Vacca -- |
author_facet | Vacca, John R. |
author_sort | Vacca, John R. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 .C66 2009eb |
callnumber-search | QA76.9.A25 .C66 2009eb |
callnumber-sort | QA 276.9 A25 C66 42009EB |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
collection | ZDB-4-EBA |
contents | Building a secure organization / A cryptography primer / Preventing system intrusions / Guarding against network intrusions / Unix and Linux security / Eliminating the security weakness of Linux and Unix operating systems / Internet security / The botnet problem / Intranet security / Local area network security / Wireless network security / Cellular network security / RFID security / Information security essentials for IT managers, protecting mission-critical systems / Security management systems / Information technology security management / Identity management / Intrusion prevention and detection systems / Computer forensics / Network forensics / Firewalls / Penetration testing / What is vulnerability assessment? / Data encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy / Personal privacy policies / Virtual private networks / Identity theft / VoIP security / SAN security / Storage area networking devices security / Risk management / Physical security essentials / Biometrics / Homeland security / Information warfare / Security through diversity / Reputation management / Content filtering / Data loss protection / Configuring authentication service on Microsoft Windows Vista / Security management and resiliency / List of top security implementation and deployment companies -- List of security products -- List of security standards -- List of miscellaneous security resources -- Ensuring built-in frequency hopping spread spectrum wireless network security -- Configuring wireless internet security remote access -- Frequently asked questions -- |
ctrlnum | (OCoLC)429898404 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10140cam a2200865 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn429898404</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">090810s2009 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OPELS</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OSU</subfield><subfield code="d">EBLCP</subfield><subfield code="d">COO</subfield><subfield code="d">CNCGM</subfield><subfield code="d">E7B</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ALAUL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">ZAD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">S3O</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">FEM</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCE</subfield><subfield code="d">OTZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CUY</subfield><subfield code="d">MERUC</subfield><subfield code="d">ZCU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LUN</subfield><subfield code="d">UKCRE</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA938836</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">015116339</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">458273793</subfield><subfield code="a">605705457</subfield><subfield code="a">647821738</subfield><subfield code="a">741343985</subfield><subfield code="a">769362626</subfield><subfield code="a">771282247</subfield><subfield code="a">815781925</subfield><subfield code="a">823121010</subfield><subfield code="a">823842388</subfield><subfield code="a">823910192</subfield><subfield code="a">824098700</subfield><subfield code="a">824153881</subfield><subfield code="a">968060998</subfield><subfield code="a">969060040</subfield><subfield code="a">980601249</subfield><subfield code="a">994922161</subfield><subfield code="a">1081288561</subfield><subfield code="a">1107341409</subfield><subfield code="a">1129352098</subfield><subfield code="a">1153055056</subfield><subfield code="a">1192342909</subfield><subfield code="a">1228567262</subfield><subfield code="a">1240509232</subfield><subfield code="a">1391280079</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080921945</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080921949</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123743540</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123743541</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780123743541</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9786612168703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)429898404</subfield><subfield code="z">(OCoLC)458273793</subfield><subfield code="z">(OCoLC)605705457</subfield><subfield code="z">(OCoLC)647821738</subfield><subfield code="z">(OCoLC)741343985</subfield><subfield code="z">(OCoLC)769362626</subfield><subfield code="z">(OCoLC)771282247</subfield><subfield code="z">(OCoLC)815781925</subfield><subfield code="z">(OCoLC)823121010</subfield><subfield code="z">(OCoLC)823842388</subfield><subfield code="z">(OCoLC)823910192</subfield><subfield code="z">(OCoLC)824098700</subfield><subfield code="z">(OCoLC)824153881</subfield><subfield code="z">(OCoLC)968060998</subfield><subfield code="z">(OCoLC)969060040</subfield><subfield code="z">(OCoLC)980601249</subfield><subfield code="z">(OCoLC)994922161</subfield><subfield code="z">(OCoLC)1081288561</subfield><subfield code="z">(OCoLC)1107341409</subfield><subfield code="z">(OCoLC)1129352098</subfield><subfield code="z">(OCoLC)1153055056</subfield><subfield code="z">(OCoLC)1192342909</subfield><subfield code="z">(OCoLC)1228567262</subfield><subfield code="z">(OCoLC)1240509232</subfield><subfield code="z">(OCoLC)1391280079</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.C66 2009eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Computer and information security handbook /</subfield><subfield code="c">edited by John R. Vacca.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier ;</subfield><subfield code="a">Burlington, MA :</subfield><subfield code="b">Morgan Kaufmann,</subfield><subfield code="c">©2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxii, 844 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Morgan Kaufmann series in computer security</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Building a secure organization /</subfield><subfield code="r">John Mallery --</subfield><subfield code="t">A cryptography primer /</subfield><subfield code="r">Scott R. Ellis --</subfield><subfield code="t">Preventing system intrusions /</subfield><subfield code="r">Michael West --</subfield><subfield code="t">Guarding against network intrusions /</subfield><subfield code="r">Tom Chen and Patrick J. Walsh --</subfield><subfield code="t">Unix and Linux security /</subfield><subfield code="r">Gerald Beuchelt --</subfield><subfield code="t">Eliminating the security weakness of Linux and Unix operating systems /</subfield><subfield code="r">Mario Santana --</subfield><subfield code="t">Internet security /</subfield><subfield code="r">Jesse Walker --</subfield><subfield code="t">The botnet problem /</subfield><subfield code="r">Xinyuan Wang and Daniel ramsbrock --</subfield><subfield code="t">Intranet security /</subfield><subfield code="r">Bill Mansoor --</subfield><subfield code="t">Local area network security /</subfield><subfield code="r">Pramod Pandya --</subfield><subfield code="t">Wireless network security /</subfield><subfield code="r">Chunming Rong and Erdal Cayirci --</subfield><subfield code="t">Cellular network security /</subfield><subfield code="r">Peng Liu, Thomas F. LaPorta and Kameswari Kotapati --</subfield><subfield code="t">RFID security /</subfield><subfield code="r">Chunming Rong and Erdal Cayirci --</subfield><subfield code="t">Information security essentials for IT managers, protecting mission-critical systems /</subfield><subfield code="r">Albert Caballero --</subfield><subfield code="t">Security management systems /</subfield><subfield code="r">Joe Wright and Jim Harmening --</subfield><subfield code="t">Information technology security management /</subfield><subfield code="r">Rahul Bhasker and Bhushan Kapoor --</subfield><subfield code="t">Identity management /</subfield><subfield code="r">Jean-Marc Seigneur and Tewfiq El Malika --</subfield><subfield code="t">Intrusion prevention and detection systems /</subfield><subfield code="r">Christopher Day --</subfield><subfield code="t">Computer forensics /</subfield><subfield code="r">Scott R. Ellis --</subfield><subfield code="t">Network forensics /</subfield><subfield code="r">Yong Guan --</subfield><subfield code="t">Firewalls /</subfield><subfield code="r">Errin W. Fulp --</subfield><subfield code="t">Penetration testing /</subfield><subfield code="r">Sanjay Bavisi --</subfield><subfield code="t">What is vulnerability assessment? /</subfield><subfield code="r">Almantas Kakareka --</subfield><subfield code="t">Data encryption /</subfield><subfield code="r">Bhushan Kapoor and Pramod Pandya --</subfield><subfield code="t">Satellite encryption /</subfield><subfield code="r">Daniel S. Soper --</subfield><subfield code="t">Public key infrastructure /</subfield><subfield code="r">Terence Spies --</subfield><subfield code="t">Instant-messaging security /</subfield><subfield code="r">Samuel J.J. Curry --</subfield><subfield code="t">NET privacy /</subfield><subfield code="r">Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --</subfield><subfield code="t">Personal privacy policies /</subfield><subfield code="r">George Yee and Larry Korba --</subfield><subfield code="t">Virtual private networks /</subfield><subfield code="r">Jim Harmening and Joe Wright --</subfield><subfield code="t">Identity theft /</subfield><subfield code="r">Markus Jacobsson and Alex Tsow --</subfield><subfield code="t">VoIP security /</subfield><subfield code="r">Dan Wing and Harsh Kupwade Patil --</subfield><subfield code="t">SAN security /</subfield><subfield code="r">John McGowan, Jeffrey Bardin and John McDonald --</subfield><subfield code="t">Storage area networking devices security /</subfield><subfield code="r">Robert Rounsavall --</subfield><subfield code="t">Risk management /</subfield><subfield code="r">Sokratis K. Katsikas --</subfield><subfield code="t">Physical security essentials /</subfield><subfield code="r">William Stallings --</subfield><subfield code="t">Biometrics /</subfield><subfield code="r">Luther Martin --</subfield><subfield code="t">Homeland security /</subfield><subfield code="r">Rahul Bhaskar and Bhushan Kapoor --</subfield><subfield code="t">Information warfare /</subfield><subfield code="r">Jan Eloff and Anna Granova --</subfield><subfield code="t">Security through diversity /</subfield><subfield code="r">Kevin Noble --</subfield><subfield code="t">Reputation management /</subfield><subfield code="r">Jean-Marc Seigneur --</subfield><subfield code="t">Content filtering /</subfield><subfield code="r">Peter Nicoletti --</subfield><subfield code="t">Data loss protection /</subfield><subfield code="r">Ken Perkins --</subfield><subfield code="g">Appendix A:</subfield><subfield code="t">Configuring authentication service on Microsoft Windows Vista /</subfield><subfield code="r">John R. Vacca --</subfield><subfield code="g">Appendix B:</subfield><subfield code="t">Security management and resiliency /</subfield><subfield code="r">John R. Vacca --</subfield><subfield code="g">Appendix C:</subfield><subfield code="t">List of top security implementation and deployment companies --</subfield><subfield code="g">Appendix D:</subfield><subfield code="t">List of security products --</subfield><subfield code="g">Appendix E:</subfield><subfield code="t">List of security standards --</subfield><subfield code="g">Appendix F:</subfield><subfield code="t">List of miscellaneous security resources --</subfield><subfield code="g">Appendix G:</subfield><subfield code="t">Ensuring built-in frequency hopping spread spectrum wireless network security --</subfield><subfield code="g">Appendix H:</subfield><subfield code="t">Configuring wireless internet security remote access --</subfield><subfield code="g">Appendix I:</subfield><subfield code="t">Frequently asked questions --</subfield><subfield code="g">Appendix J: Glossary.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. & nbsp;Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2011.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2011</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatique.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Manuels.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4072806-7</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4070085-9</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="a">Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Aufsatzsammlung.</subfield><subfield code="2">swd</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vacca, John R.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n91039772</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Computer and information security handbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH9qRGy3B6CxWfqT8HHMrm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Computer and information security handbook.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, ©2009</subfield><subfield code="z">9780123743541</subfield><subfield code="w">(OCoLC)299240534</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Morgan Kaufmann series in computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007139011</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=248988</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=248988</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780123743541</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780123743541</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">41940</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00032165</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL453166</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">248988</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3057010</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">computerinformat0000unse_y3h5</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Aufsatzsammlung. swd |
genre_facet | Aufsatzsammlung. |
id | ZDB-4-EBA-ocn429898404 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:36:25Z |
institution | BVB |
isbn | 9780080921945 0080921949 0123743540 9780123743541 |
language | English |
oclc_num | 429898404 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xxxii, 844 pages) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Elsevier ; Morgan Kaufmann, |
record_format | marc |
series | Morgan Kaufmann series in computer security. |
series2 | The Morgan Kaufmann series in computer security |
spelling | Computer and information security handbook / edited by John R. Vacca. Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, ©2009. 1 online resource (xxxii, 844 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file The Morgan Kaufmann series in computer security Includes bibliographical references and index. Building a secure organization / John Mallery -- A cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- The botnet problem / Xinyuan Wang and Daniel ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A: Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B: Security management and resiliency / John R. Vacca -- Appendix C: List of top security implementation and deployment companies -- Appendix D: List of security products -- Appendix E: List of security standards -- Appendix F: List of miscellaneous security resources -- Appendix G: Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H: Configuring wireless internet security remote access -- Appendix I: Frequently asked questions -- Appendix J: Glossary. This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. & nbsp;Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2011. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Informatique. eclas Sécurité informatique. eclas Manuels. eclas Computer networks Security measures fast Computersicherheit gnd Datensicherung gnd Informationssystem gnd http://d-nb.info/gnd/4072806-7 Rechnernetz gnd http://d-nb.info/gnd/4070085-9 Computer networks Security measures Aufsatzsammlung. swd Vacca, John R. http://id.loc.gov/authorities/names/n91039772 has work: Computer and information security handbook (Text) https://id.oclc.org/worldcat/entity/E39PCH9qRGy3B6CxWfqT8HHMrm https://id.oclc.org/worldcat/ontology/hasWork Print version: Computer and information security handbook. Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, ©2009 9780123743541 (OCoLC)299240534 Morgan Kaufmann series in computer security. http://id.loc.gov/authorities/names/no2007139011 |
spellingShingle | Computer and information security handbook / Morgan Kaufmann series in computer security. Building a secure organization / A cryptography primer / Preventing system intrusions / Guarding against network intrusions / Unix and Linux security / Eliminating the security weakness of Linux and Unix operating systems / Internet security / The botnet problem / Intranet security / Local area network security / Wireless network security / Cellular network security / RFID security / Information security essentials for IT managers, protecting mission-critical systems / Security management systems / Information technology security management / Identity management / Intrusion prevention and detection systems / Computer forensics / Network forensics / Firewalls / Penetration testing / What is vulnerability assessment? / Data encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy / Personal privacy policies / Virtual private networks / Identity theft / VoIP security / SAN security / Storage area networking devices security / Risk management / Physical security essentials / Biometrics / Homeland security / Information warfare / Security through diversity / Reputation management / Content filtering / Data loss protection / Configuring authentication service on Microsoft Windows Vista / Security management and resiliency / List of top security implementation and deployment companies -- List of security products -- List of security standards -- List of miscellaneous security resources -- Ensuring built-in frequency hopping spread spectrum wireless network security -- Configuring wireless internet security remote access -- Frequently asked questions -- Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Informatique. eclas Sécurité informatique. eclas Manuels. eclas Computer networks Security measures fast Computersicherheit gnd Datensicherung gnd Informationssystem gnd http://d-nb.info/gnd/4072806-7 Rechnernetz gnd http://d-nb.info/gnd/4070085-9 |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://d-nb.info/gnd/4072806-7 http://d-nb.info/gnd/4070085-9 |
title | Computer and information security handbook / |
title_alt | Building a secure organization / A cryptography primer / Preventing system intrusions / Guarding against network intrusions / Unix and Linux security / Eliminating the security weakness of Linux and Unix operating systems / Internet security / The botnet problem / Intranet security / Local area network security / Wireless network security / Cellular network security / RFID security / Information security essentials for IT managers, protecting mission-critical systems / Security management systems / Information technology security management / Identity management / Intrusion prevention and detection systems / Computer forensics / Network forensics / Firewalls / Penetration testing / What is vulnerability assessment? / Data encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy / Personal privacy policies / Virtual private networks / Identity theft / VoIP security / SAN security / Storage area networking devices security / Risk management / Physical security essentials / Biometrics / Homeland security / Information warfare / Security through diversity / Reputation management / Content filtering / Data loss protection / Configuring authentication service on Microsoft Windows Vista / Security management and resiliency / List of top security implementation and deployment companies -- List of security products -- List of security standards -- List of miscellaneous security resources -- Ensuring built-in frequency hopping spread spectrum wireless network security -- Configuring wireless internet security remote access -- Frequently asked questions -- |
title_auth | Computer and information security handbook / |
title_exact_search | Computer and information security handbook / |
title_full | Computer and information security handbook / edited by John R. Vacca. |
title_fullStr | Computer and information security handbook / edited by John R. Vacca. |
title_full_unstemmed | Computer and information security handbook / edited by John R. Vacca. |
title_short | Computer and information security handbook / |
title_sort | computer and information security handbook |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Informatique. eclas Sécurité informatique. eclas Manuels. eclas Computer networks Security measures fast Computersicherheit gnd Datensicherung gnd Informationssystem gnd http://d-nb.info/gnd/4072806-7 Rechnernetz gnd http://d-nb.info/gnd/4070085-9 |
topic_facet | Computer networks Security measures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Informatique. Sécurité informatique. Manuels. Computer networks Security measures Computersicherheit Datensicherung Informationssystem Rechnernetz Aufsatzsammlung. |
work_keys_str_mv | AT vaccajohnr computerandinformationsecurityhandbook |