Network and System Security / Edition 2

Network and System Security / Edition 2

by John R. Vacca
     
 

View All Available Formats & Editions

ISBN-10: 012416689X

ISBN-13: 9780124166899

Pub. Date: 09/23/2013

Publisher: Elsevier Science

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage

Overview

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

  • Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere
  • Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work
  • Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions

Product Details

ISBN-13:
9780124166899
Publisher:
Elsevier Science
Publication date:
09/23/2013
Edition description:
New Edition
Pages:
432
Sales rank:
1,209,811
Product dimensions:
7.40(w) x 9.10(h) x 0.90(d)

Table of Contents

Ch 1.Detecting System Intrusions
Ch 2.Preventing System Intrusions
Ch 3.Guarding Against Network Intrusions
Ch 4.Securing Cloud Computing Systems
Ch 5.Unix and Linux Security
Ch 6.Eliminating the Security Weakness of Linux and Unix Operating Systems
Ch 7.Internet Security
Ch 8.Intranet Security
Ch 9.Local Area Network Security
Ch 10.Wireless Network Security
Ch 11.Cellular Network Security
Ch 12.RFID Security
Ch 13.Optical Wireless Security

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >