×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Handbook of Information Security, 3-Volume Set / Edition 1
     

Handbook of Information Security, 3-Volume Set / Edition 1

by Hossein Bidgoli
 

ISBN-10: 0471648337

ISBN-13: 9780471648338

Pub. Date: 12/30/2005

Publisher: Wiley

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.The text contains 207 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information

Overview

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.The text contains 207 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Product Details

ISBN-13:
9780471648338
Publisher:
Wiley
Publication date:
12/30/2005
Pages:
3366
Product dimensions:
8.80(w) x 11.26(h) x 6.74(d)

Table of Contents

THE HANDBOOK OF INFORMATION SECURITY, VOLUME I KEY CONCEPTS, INFRASTRUCTURE, STANDARDS AND PROTOCOLS CONTENTS.

Part 1: Key Concepts and Applications Related to Information Security.  

Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer.

Part 3: Standards and Protocols for Secure Information Transfer.

THE HANDBOOK OF INFORMATION SECURITY, VOLUME II INFORMATION  WARFARE, SOCIAL, LEGAL, AND INTERNATIONAL ISSUES AND SECURITY FOUNDATIONS.

Part 1: Information Warfare.

Part 2: Social, and Legal Issues.

Part 3: Foundations of Information, Computer and Network Security.

THE HANDBOOK OF INFORMATION SECURITY, VOLUME III THREATS, VULNERABILITIES, PREVENTION, DETECTION AND MANAGEMENT.

Part 1: Threats and Vulnerabilities to Information and Computing Infrastructures.

Part 2: Prevention: Keeping the Hackers and Crackers at Bay.

Part 3: Detection, Recovery, Management and Policy Considerations.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews