Computer and information security handbook / edited by John R. Vacca
Series: The Morgan Kaufmann series in computer securityPublication details: Amsterdam : Elsevier , 2009Description: xxxii, 844 p. : ill. ; 29 cmISBN:- 9780123743541
- 0123743540
| Item type | Current library | Home library | Collection | Call number | Materials specified | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|---|---|
| AM | PERPUSTAKAAN TUN SERI LANANG | PERPUSTAKAAN TUN SERI LANANG KOLEKSI AM-P. TUN SERI LANANG (ARAS 5) | - | QA76.9.A25 C66 (Browse shelf(Opens below)) | 1 | Available | 00002021200 |
Browsing PERPUSTAKAAN TUN SERI LANANG shelves, Shelving location: KOLEKSI AM-P. TUN SERI LANANG (ARAS 5) Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.9.A23J66 Qualified types : theory and practice / | QA76.9.A23R55 Data abstraction and structures : an introduction to computer science II / | QA76.9.A25 .K483 Transparent cryptography for storage images / | QA76.9.A25 C66 Computer and information security handbook / | QA76.9.A25 F57 Secure electronic commerce building the infrastructure for digital signatures and encryption | QA76.9.A25.M3535 Assessing and managing security risk in IT systems : a structured methodology / | QA76.9.A25 M368 2011 Introduction to cryptography with open-source software / |
Includes bibliographical references and index
Overview of system and network security : a comprehensive introduction / John Mallery -- A cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- The botnet problem / Xinyuan Wang and Daniel ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A: Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B: Security management and resiliency / John R. Vacca -- Appendix C: List of top security implementation and deployment companies -- Appendix D: List of security products -- Appendix E: List of security standards -- Appendix F: List of miscellaneous security resources -- Appendix G: Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H: Configuring wireless internet security remote access -- Appendix I: Frequently asked questions -- Appendix J: Glossary
There are no comments on this title.
