Computer and Information Security Handbook
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 - Written by leaders in the field - Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices - Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
1128916790
Computer and Information Security Handbook
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 - Written by leaders in the field - Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices - Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
130.0 In Stock
Computer and Information Security Handbook

Computer and Information Security Handbook

Computer and Information Security Handbook

Computer and Information Security Handbook

eBook

$130.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 - Written by leaders in the field - Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices - Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Product Details

ISBN-13: 9780128039298
Publisher: Morgan Kaufmann Publishers
Publication date: 05/10/2017
Sold by: Barnes & Noble
Format: eBook
Pages: 1280
File size: 257 MB
Note: This product may take a few minutes to download.

About the Author

John Vacca is an independent information technology consultant and researcher, professional writer, editor, reviewer, and author based in Pomeroy, Ohio, USA. Since 1982, John has authored, edited, and published more than 85 books, including Smart Cities Policies and Financing: Approaches and Solutions, Elsevier; Cloud Computing Security: Foundations and Challenges, Taylor and Francis/CRC Press; Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation, Elsevier; Online Terrorist Propaganda, Recruitment, and Radicalization, Taylor and Francis/CRC Press; Nanoscale Networking and Communications Handbook, Taylor and Francis/CRC Press; Handbook of Sensor Networking: Advanced Technologies and Applications, Taylor and Francis/CRC Press; Network and System Security 2/e, Elsevier/Syngress; Cyber Security and IT Infrastructure Protection, Elsevier/Syngress; and Managing Information Security 2/e, Elsevier/Syngress; among many others. John was a Configuration Management Specialist, Computer Specialist, and the Computer Security Official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. John has also been a security consultant for major motion pictures, including AntiTrust, Collateral, and Identity Theft: The Michelle Brown Story. He received his M.Sc. from Kansas State University and an MBA from Emporia State University and served in the United States Air Force from 1967-1971.

Table of Contents

1. Information Security in the Modern Enterprise2. Building a Secure Organization3. A Cryptography Primer4. Verifying User and Host Identity5. Detecting System Intrusions6. Intrusion Detection in Contemporary Environments7. Preventing System Intrusions8. Guarding Against Network Intrusions9. Fault Tolerance and Resilience in Cloud Computing Environments10. Securing Web Applications, Services and Servers11. Unix and Linux Security12. Eliminating the Security Weakness of Linux and Unix Operating Systems13. Internet Security14. The Botnet Problem15. Intranet Security16. Wireless Network Security17. Wireless Sensor Network Security18. Security for the Internet of Things19. Cellular Network Security20. RFID Security21. Information Security Essentials for IT Managers, Protecting Mission-Critical Systems22. Security Management Systems23. Policy-Driven System Management24. Social Engineering Deceptions and Defenses 25. Ethical Hacking 26. What Is Vulnerability Assessment?27. Security Education, Training, and Awareness28. Risk Management29. Insider Threats30. Disaster Recovery31. Disaster Recovery Plans for Small and Medium Business (SMB)32. Security Certification And Standards Implementation33. Security Policies And Plans Development 34. Cyber Forensics35. Cyber Forensics and Incident Response36. Securing eDiscovery37. Microsoft Office and Metadata Forensics: A Deeper Dive38. Hard Drive Imaging39. Satellite Encryption40. Public Key Infrastructure41. Context-Aware Multi-Factor Authentication42. Instant-Messaging Security43. Online Privacy44. Privacy-enhancing Technologies45. Detection Of Conflicts In Security Policies46. Supporting User Privacy Preferences in Digital Interactions47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions48. Virtual Private Networks49. VoIP Security50. Storage Area Networking Devices Security51. Securing Cloud Computing Systems52. Cloud Security53. Private Cloud Security54. Virtual Private Cloud Security55. Protecting Virtual Infrastructure56. SDN and NFV Security57. Physical Security Essentials58. Online Identity and User Management Services59. Intrusion Prevention and Detection Systems60. Penetration Testing61. Access Controls62. Endpoint Security63. Fundamentals of Cryptography64. Securing the Infrastructure65. Cyber Warfare66. Security Through Diversity67. Online e-Reputation Management Services68. Data Loss Protection69. Satellite Cyber Attack Search and Destroy70. Advanced Data EncryptionAppendices (Online only)

What People are Saying About This

From the Publisher

Comprehensive, up-to-date reference on computer and information security that offers the latest insights on emerging technologies and advancements

From the B&N Reads Blog

Customer Reviews