000 04082cam a22003017a 4500
005 20250918123511.0
008 101126s2009 ne a b 001 0 eng c
020 _a9780123743541
_cRM340.74
020 _a0123743540
039 9 _a201012221136
_bariff
_c201011261245
_drahah
_y11-26-2010
_zrahah
040 _aUKM
090 _aQA76.9.A25 C66
090 _aQA76.9.A25
_bC66 2009
245 0 0 _aComputer and information security handbook /
_cedited by John R. Vacca
260 _aAmsterdam :
_bElsevier ,
_c2009
300 _axxxii, 844 p. :
_bill. ;
_c29 cm.
490 0 _aThe Morgan Kaufmann series in computer security
504 _aIncludes bibliographical references and index
505 0 0 _tOverview of system and network security : a comprehensive introduction /
_rJohn Mallery --
_tA cryptography primer /
_rScott R. Ellis --
_tPreventing system intrusions /
_rMichael West --
_tGuarding against network intrusions /
_rTom Chen and Patrick J. Walsh --
_tUnix and Linux security /
_rGerald Beuchelt --
_tEliminating the security weakness of Linux and Unix operating systems /
_rMario Santana --
_tInternet security /
_rJesse Walker --
_tThe botnet problem /
_rXinyuan Wang and Daniel ramsbrock --
_tIntranet security /
_rBill Mansoor --
_tLocal area network security /
_rPramod Pandya --
_tWireless network security /
_rChunming Rong and Erdal Cayirci --
_tCellular network security /
_rPeng Liu, Thomas F. LaPorta and Kameswari Kotapati --
_tRFID security /
_rChunming Rong and Erdal Cayirci --
_tInformation security essentials for IT managers, protecting mission-critical systems /
_rAlbert Caballero --
_tSecurity management systems /
_rJoe Wright and Jim Harmening --
_tInformation technology security management /
_rRahul Bhasker and Bhushan Kapoor --
_tIdentity management /
_rJean-Marc Seigneur and Tewfiq El Malika --
_tIntrusion prevention and detection systems /
_rChristopher Day --
_tComputer forensics /
_rScott R. Ellis --
_tNetwork forensics /
_rYong Guan --
_tFirewalls /
_rErrin W. Fulp --
_tPenetration testing /
_rSanjay Bavisi --
_tWhat is vulnerability assessment? /
_rAlmantas Kakareka --
_tData encryption /
_rBhushan Kapoor and Pramod Pandya --
_tSatellite encryption /
_rDaniel S. Soper --
_tPublic key infrastructure /
_rTerence Spies --
_tInstant-messaging security /
_rSamuel J.J. Curry --
_tNET privacy /
_rMarco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --
_tPersonal privacy policies /
_rGeorge Yee and Larry Korba --
_tVirtual private networks /
_rJim Harmening and Joe Wright --
_tIdentity theft /
_rMarkus Jacobsson and Alex Tsow --
_tVoIP security /
_rDan Wing and Harsh Kupwade Patil --
_tSAN security /
_rJohn McGowan, Jeffrey Bardin and John McDonald --
_tStorage area networking devices security /
_rRobert Rounsavall --
_tRisk management /
_rSokratis K. Katsikas --
_tPhysical security essentials /
_rWilliam Stallings --
_tBiometrics /
_rLuther Martin --
_tHomeland security /
_rRahul Bhaskar and Bhushan Kapoor --
_tInformation warfare /
_rJan Eloff and Anna Granova --
_tSecurity through diversity /
_rKevin Noble --
_tReputation management /
_rJean-Marc Seigneur --
_tContent filtering /
_rPeter Nicoletti --
_tData loss protection /
_rKen Perkins --
_gAppendix A:
_tConfiguring authentication service on Microsoft Windows Vista /
_rJohn R. Vacca --
_gAppendix B:
_tSecurity management and resiliency /
_rJohn R. Vacca --
_gAppendix C:
_tList of top security implementation and deployment companies --
_gAppendix D:
_tList of security products --
_gAppendix E:
_tList of security standards --
_gAppendix F:
_tList of miscellaneous security resources --
_gAppendix G:
_tEnsuring built-in frequency hopping spread spectrum wireless network security --
_gAppendix H:
_tConfiguring wireless internet security remote access --
_gAppendix I:
_tFrequently asked questions --
_gAppendix J: Glossary
650 0 _aComputer networks
_xSecurity measures
700 1 _aVacca, John R.
907 _a.b14844904
_b2021-05-28
_c2019-11-12
942 _c01
_n0
_kQA76.9.A25 C66
914 _avtls003445907
991 _aFakulti Teknologi & Sains Maklumat
998 _at
_b2010-01-11
_cm
_da
_feng
_gne
_y0
_z.b14844904
999 _c471114
_d471114