BN.com Gift Guide

Information Security The Complete Reference, Second Edition / Edition 2

Paperback (Print)
Rent
Rent from BN.com
$17.43
(Save 75%)
Est. Return Date: 02/16/2015
Buy Used
Buy Used from BN.com
$41.17
Used and New from Other Sellers
Used and New from Other Sellers
from $15.60
Usually ships in 1-2 business days
(Save 77%)
Other sellers (Paperback)
  • All (17) from $15.60   
  • New (11) from $36.16   
  • Used (6) from $15.60   
Close
Sort by
Page 1 of 2
Showing 1 – 10 of 17 (2 pages)
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$15.60
Seller since 2007

Feedback rating:

(4338)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Acceptable
2013 Paperback Fair Satisfaction 100% guaranteed.

Ships from: Tucson, AZ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$15.99
Seller since 2008

Feedback rating:

(581)

Condition: Good
New and unused publishers scratch and dent. Back cover and several pages have a thin vertical slit from a box cutter then new carton was opened. Shelf wear

Ships from: Narberth, PA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$27.30
Seller since 2005

Feedback rating:

(49521)

Condition: Very Good
Ships same day or next business day via UPS (Priority Mail for AK/HI/APO/PO Boxes)! Used sticker and some writing and/or highlighting. Used books may not include working access ... code or dust jacket. Read more Show Less

Ships from: Columbia, MO

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$36.16
Seller since 2014

Feedback rating:

(98)

Condition: New
New. 2nd edition. Remainder mark at edge. We ship fast with tracking number. We do not ship to HI or AK.

Ships from: Philadelphia, PA

Usually ships in 1-2 business days

  • Standard, 48 States
$39.19
Seller since 2008

Feedback rating:

(17849)

Condition: New
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.

Ships from: Westminster, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$39.19
Seller since 2009

Feedback rating:

(10638)

Condition: New
New Book. Shipped from US within 10 to 14 business days. Established seller since 2000.

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$39.63
Seller since 2007

Feedback rating:

(23567)

Condition: New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$39.95
Seller since 2014

Feedback rating:

(21)

Condition: Good
2013 Trade paperback 2nd ed. Good. Trade paperback (US). Glued binding. 854 p. Contains: Illustrations, black & white, Tables, black & white, Figures. Complete Reference.

Ships from: Pueblo West, CO

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$40.66
Seller since 2014

Feedback rating:

(58)

Condition: New
New book in mint condition.Please allow 3-5 business days for Expedited and 6-8 business days with Standard Shipping method. We do not ship to APO/FPO.

Ships from: SUGAR LAND, TX

Usually ships in 1-2 business days

  • Standard, 48 States
  • Express, 48 States
$43.93
Seller since 2011

Feedback rating:

(42)

Condition: New
New in new dust jacket. New book in mint condition. Please allow 3-5 business days for Expedited and 6-8 business days with Standard Shipping method. We do not ship to APO/FPO.

Ships from: Sugar Land, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 2
Showing 1 – 10 of 17 (2 pages)
Close
Sort by

Overview

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.

Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.

  • Understand security concepts and building blocks
  • Identify vulnerabilities and mitigate risk
  • Optimize authentication and authorization
  • Use IRM and encryption to protect unstructured data
  • Defend storage devices, databases, and software
  • Protect network routers, switches, and firewalls
  • Secure VPN, wireless, VoIP, and PBX infrastructure
  • Design intrusion detection and prevention systems
  • Develop secure Windows, Java, and mobile applications
  • Perform incident response and forensic analysis
Read More Show Less

Product Details

  • ISBN-13: 9780071784351
  • Publisher: McGraw-Hill Professional Publishing
  • Publication date: 4/26/2013
  • Series: Complete Reference Series
  • Edition number: 2
  • Pages: 896
  • Sales rank: 410,118
  • Product dimensions: 7.30 (w) x 9.10 (h) x 1.60 (d)

Meet the Author

Mark Rhodes-Ousley has 20 years of experience with every aspect of security, from program management to technology. That experience includes risk management, security policies, security management, technology implementation and operations, physical security, disaster recovery, and business continuity planning. He holds two core beliefs: that business processes are just as important as technology because security relies on people; and that security should be a business enabler with a goal of enhancing the customer experience. Mark is CISSP, CISM, and MCSE certified.

Read More Show Less

Table of Contents

Part 1: Network Security Foundations
1 Overview
2 Risk Analysis and Defense Models
3 Security Policies
4 Security Organization

Part 2: Access Control
5 Security Management
6 Physical Security
7 Operational Security
8 Authentication and Authorization Controls
9 Data Security

Part 3: Network Security
10 Network Design Considerations
11 Network Device Security
12 Firewalls
13 Virtual Private Networks
14 Wireless Network Security
15 Intrusion Detection Systems
16 Integrity and Availability
17 Network Role-Based Security
18 Voice-Over-IP (VOIP) Security

Part 4: System Security
19 Operating System Security Models
20 Unix Security
21 Linux Security
22 Windows Security

Part 5: Application Security
23 Principles of Application Security
24 Controlling Application Behavior
25 Writing Secure Software
26 J2EE Security
27 Windows .NET Security
28 Database Security

Part 6: Planning and Response
29 Disaster Recovery and Business Continuity
30 Attacks and Countermeasures
31 Incident Response and Forensic Analysis
32 Legal, Regulatory, and Standards Compliance

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)