Computer and Information Security Handbook

Hardcover
from $0.00

Author: John R. Vacca

ISBN-10: 0123743540

ISBN-13: 9780123743541

Category: Security - Computer Networks

Search in google:

Computer and Information Security Handbook is the culmination of over 40 chapters contributed by distinguished Computer and Information Security experts and carefully edited by John R. Vacca. The immediate and long term challenges that security professionals face are investigated. Computer Security theory, technology, advancements and practices are discussed in depth and from multiple viewpoints, enabling the implementation of practical solutions to any challenge security professionals may encounter. Learn how to analyze risks to networks such as audit trails IP sniffing/snooping and the steps necessary to deploy appropriate countermeasures to reduce your exposure to physical and network threats. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. Coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. This rich collection of Security practice and theory is a "must-have" for any security professional.Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.

PART I OVERVIEW OF SYSTEM AND NETWORK SECURITY: A COMPREHENSIVE INTRODUCTION CHAPTER 1 Building a Secure Organization CHAPTER 2 A Cryptography Primer CHAPTER 3 Preventing System Intrusions CHAPTER 4 Guarding Against Network Intrusions CHAPTER 5 UNIX and Linux Security CHAPTER 6 Linux and UNIX Security CHAPTER 7 Internet Security CHAPTER 8 Internet Security: The Botnet Problem in Internet Security CHAPTER 9 Intranet Security CHAPTER 10 Local Area Network (LAN) Security CHAPTER 11 Wireless Network Security CHAPTER 12 Cellular Network Security CHAPTER 13 RFID Security PART II MANAGING INFORMATION SECURITY CHAPTER 14 Security Essentials for IT Managers: Protecting Mission-Critical Systems CHAPTER 15 Security Management Systems CHAPTER 16 IT Security Management CHAPTER 17 ID Management CHAPTER 18 Intrusion Detection and Prevention Systems CHAPTER 19 Computer Forensics CHAPTER 20 Network Forensics CHAPTER 21 Firewalls CHAPTER 22 Penetration Testing CHAPTER 23 Vulnerability Assessment PART III ENCRYPTION TECHNOLOGY CHAPTER 24 Data Encryption CHAPTER 25 Satellite Encryption CHAPTER 26 Public Key Infrastructure CHAPTER 27 Instant Messaging Security PART IV PRIVACY AND ACCESS MANAGEMENT CHAPTER 28 Net Privacy CHAPTER 29 Personal Privacy Policies CHAPTER 30 Virtual Private Networks CHAPTER 31 Identity Theft CHAPTER 32 VoIP Security PART V STORAGE SECURITY CHAPTER 33 SAN Security CHAPTER 34 Storage Area Network Security CHAPTER 35 Risk Management PART VI STORAGE SECURITY CHAPTER 36 Physical Security Essentials CHAPTER 37 Biometerics CHAPTER 38 Homeland Security CHAPTER 39 Information Warfare PART VII ADVANCED SECURITY CHAPTER 40 Security Through Diversity CHAPTER 41 Online Reputation CHAPTER 42 Content Filtering CHAPTER 43 Data Loss Protection (DLP)PART VIII APPENDICES APPENDIX A Configuring Authentication Service On Microsoft Windows Vista APPENDIX B Security Management and Resiliency APPENDIX C List Of Top Security Implementation And Deployment Companies APPENDIX D List Of Security Products APPENDIX E List Of Security Standards APPENDIX F List Of Miscellaneous Security Resources APPENDIX G Ensuring Built-in Frequency Hopping Spread Spectrum Wireless Network Security APPENDIX H Configuring Wireless Internet Security Remote Access APPENDIX I Frequently Asked Questions APPENDIX J Glossary