| 000 | 04082cam a22003017a 4500 | ||
|---|---|---|---|
| 005 | 20250918123511.0 | ||
| 008 | 101126s2009 ne a b 001 0 eng c | ||
| 020 |
_a9780123743541 _cRM340.74 |
||
| 020 | _a0123743540 | ||
| 039 | 9 |
_a201012221136 _bariff _c201011261245 _drahah _y11-26-2010 _zrahah |
|
| 040 | _aUKM | ||
| 090 | _aQA76.9.A25 C66 | ||
| 090 |
_aQA76.9.A25 _bC66 2009 |
||
| 245 | 0 | 0 |
_aComputer and information security handbook / _cedited by John R. Vacca |
| 260 |
_aAmsterdam : _bElsevier , _c2009 |
||
| 300 |
_axxxii, 844 p. : _bill. ; _c29 cm. |
||
| 490 | 0 | _aThe Morgan Kaufmann series in computer security | |
| 504 | _aIncludes bibliographical references and index | ||
| 505 | 0 | 0 |
_tOverview of system and network security : a comprehensive introduction / _rJohn Mallery -- _tA cryptography primer / _rScott R. Ellis -- _tPreventing system intrusions / _rMichael West -- _tGuarding against network intrusions / _rTom Chen and Patrick J. Walsh -- _tUnix and Linux security / _rGerald Beuchelt -- _tEliminating the security weakness of Linux and Unix operating systems / _rMario Santana -- _tInternet security / _rJesse Walker -- _tThe botnet problem / _rXinyuan Wang and Daniel ramsbrock -- _tIntranet security / _rBill Mansoor -- _tLocal area network security / _rPramod Pandya -- _tWireless network security / _rChunming Rong and Erdal Cayirci -- _tCellular network security / _rPeng Liu, Thomas F. LaPorta and Kameswari Kotapati -- _tRFID security / _rChunming Rong and Erdal Cayirci -- _tInformation security essentials for IT managers, protecting mission-critical systems / _rAlbert Caballero -- _tSecurity management systems / _rJoe Wright and Jim Harmening -- _tInformation technology security management / _rRahul Bhasker and Bhushan Kapoor -- _tIdentity management / _rJean-Marc Seigneur and Tewfiq El Malika -- _tIntrusion prevention and detection systems / _rChristopher Day -- _tComputer forensics / _rScott R. Ellis -- _tNetwork forensics / _rYong Guan -- _tFirewalls / _rErrin W. Fulp -- _tPenetration testing / _rSanjay Bavisi -- _tWhat is vulnerability assessment? / _rAlmantas Kakareka -- _tData encryption / _rBhushan Kapoor and Pramod Pandya -- _tSatellite encryption / _rDaniel S. Soper -- _tPublic key infrastructure / _rTerence Spies -- _tInstant-messaging security / _rSamuel J.J. Curry -- _tNET privacy / _rMarco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- _tPersonal privacy policies / _rGeorge Yee and Larry Korba -- _tVirtual private networks / _rJim Harmening and Joe Wright -- _tIdentity theft / _rMarkus Jacobsson and Alex Tsow -- _tVoIP security / _rDan Wing and Harsh Kupwade Patil -- _tSAN security / _rJohn McGowan, Jeffrey Bardin and John McDonald -- _tStorage area networking devices security / _rRobert Rounsavall -- _tRisk management / _rSokratis K. Katsikas -- _tPhysical security essentials / _rWilliam Stallings -- _tBiometrics / _rLuther Martin -- _tHomeland security / _rRahul Bhaskar and Bhushan Kapoor -- _tInformation warfare / _rJan Eloff and Anna Granova -- _tSecurity through diversity / _rKevin Noble -- _tReputation management / _rJean-Marc Seigneur -- _tContent filtering / _rPeter Nicoletti -- _tData loss protection / _rKen Perkins -- _gAppendix A: _tConfiguring authentication service on Microsoft Windows Vista / _rJohn R. Vacca -- _gAppendix B: _tSecurity management and resiliency / _rJohn R. Vacca -- _gAppendix C: _tList of top security implementation and deployment companies -- _gAppendix D: _tList of security products -- _gAppendix E: _tList of security standards -- _gAppendix F: _tList of miscellaneous security resources -- _gAppendix G: _tEnsuring built-in frequency hopping spread spectrum wireless network security -- _gAppendix H: _tConfiguring wireless internet security remote access -- _gAppendix I: _tFrequently asked questions -- _gAppendix J: Glossary |
| 650 | 0 |
_aComputer networks _xSecurity measures |
|
| 700 | 1 | _aVacca, John R. | |
| 907 |
_a.b14844904 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQA76.9.A25 C66 |
||
| 914 | _avtls003445907 | ||
| 991 | _aFakulti Teknologi & Sains Maklumat | ||
| 998 |
_at _b2010-01-11 _cm _da _feng _gne _y0 _z.b14844904 |
||
| 999 |
_c471114 _d471114 |
||