Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols / Edition 1 by Hossein Bidgoli | 9780471648307 | Hardcover | Barnes & Noble
Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols / Edition 1

Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols / Edition 1

by Hossein Bidgoli
     
 

ISBN-10: 0471648302

ISBN-13: 9780471648307

Pub. Date: 01/03/2006

Publisher: Wiley

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and

Overview

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Product Details

ISBN-13:
9780471648307
Publisher:
Wiley
Publication date:
01/03/2006
Series:
Handbook of Information Security Series
Pages:
1120
Product dimensions:
8.56(w) x 11.02(h) x 2.47(d)

Table of Contents

VOLUME I: KEY CONCEPTS, INFRASTRUCTURE, STANDARDS, AND PROTOCOLS.

Part 1: Key Concepts and Applications related to Information Security.

Part 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer.

Part 3: Standards and Protocols for Secure Information Transfer.

VOLUME II: INFORMATION WARFARE; SOCIAL, LEGAL, AND INTERNATIONAL ISSUES; AND SECURITY FOUNDATIONS.

Part 1: Information Warfare.

Part 2: Social and Legal Issues.

Part 3: Foundations of Information, Computer and Network Security.

VOLUME III: THREATS, VULNERABILITIES, PREVENTION, DETECTION, AND MANAGEMENT.

Part 1: Threats, Vulnerabilities, Prevention, Detection, and Management.

Part 2: Prevention: Keeping the Hackers and Crackers at Bay.

Part 3: Detection, Recovery, Management, and Policy Considerations.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >