Warehouse Stock Clearance Sale

Grab a bargain today!


Computer and Information Security Handbook
By

Rating

Product Description
Product Details

Promotional Information

Comprehensive, up-to-date reference on computer and information security that offers the latest insights on emerging technologies and advancements

Table of Contents

1. Information Security in the Modern Enterprise
2. Building a Secure Organization
3. A Cryptography Primer
4. Verifying User and Host Identity
5. Detecting System Intrusions
6. Intrusion Detection in Contemporary Environments
7. Preventing System Intrusions
8. Guarding Against Network Intrusions
9. Fault Tolerance and Resilience in Cloud Computing Environments
10. Securing Web Applications, Services and Servers
11. Unix and Linux Security
12. Eliminating the Security Weakness of Linux and Unix Operating Systems
13. Internet Security
14. The Botnet Problem
15. Intranet Security
16. Wireless Network Security
17. Wireless Sensor Network Security
18. Security for the Internet of Things
19. Cellular Network Security
20. RFID Security
21. Information Security Essentials for IT Managers, Protecting Mission-Critical Systems
22. Security Management Systems
23. Policy-Driven System Management
24. Social Engineering Deceptions and Defenses
25. Ethical Hacking
26. What Is Vulnerability Assessment?
27. Security Education, Training, and Awareness
28. Risk Management
29. Insider Threats
30. Disaster Recovery
31. Disaster Recovery Plans for Small and Medium Business (SMB)
32. Security Certification And Standards Implementation
33. Security Policies And Plans Development
34. Cyber Forensics
35. Cyber Forensics and Incident Response
36. Securing eDiscovery
37. Microsoft Office and Metadata Forensics: A Deeper Dive
38. Hard Drive Imaging
39. Satellite Encryption
40. Public Key Infrastructure
41. Context-Aware Multi-Factor Authentication
42. Instant-Messaging Security
43. Online Privacy
44. Privacy-enhancing Technologies
45. Detection Of Conflicts In Security Policies
46. Supporting User Privacy Preferences in Digital Interactions
47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions
48. Virtual Private Networks
49. VoIP Security
50. Storage Area Networking Devices Security
51. Securing Cloud Computing Systems
52. Cloud Security
53. Private Cloud Security
54. Virtual Private Cloud Security
55. Protecting Virtual Infrastructure
56. SDN and NFV Security
57. Physical Security Essentials
58. Online Identity and User Management Services
59. Intrusion Prevention and Detection Systems
60. Penetration Testing
61. Access Controls
62. Endpoint Security
63. Fundamentals of Cryptography
64. Securing the Infrastructure
65. Cyber Warfare
66. Security Through Diversity
67. Online e-Reputation Management Services
68. Data Loss Protection
69. Satellite Cyber Attack Search and Destroy
70. Advanced Data Encryption
Appendices (Online only)

About the Author

John Vacca is an independent information technology consultant and researcher, professional writer, editor, reviewer, and author based in Pomeroy, Ohio, USA. Since 1982, John has authored, edited, and published more than 85 books, including Smart Cities Policies and Financing: Approaches and Solutions, Elsevier; Cloud Computing Security: Foundations and Challenges, Taylor and Francis/CRC Press; Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation, Elsevier; Online Terrorist Propaganda, Recruitment, and Radicalization, Taylor and Francis/CRC Press; Nanoscale Networking and Communications Handbook, Taylor and Francis/CRC Press; Handbook of Sensor Networking: Advanced Technologies and Applications, Taylor and Francis/CRC Press; Network and System Security 2/e, Elsevier/Syngress; Cyber Security and IT Infrastructure Protection, Elsevier/Syngress; and Managing Information Security 2/e, Elsevier/Syngress; among many others.
John was a Configuration Management Specialist, Computer Specialist, and the Computer Security Official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. John has also been a security consultant for major motion pictures, including AntiTrust, Collateral, and Identity Theft: The Michelle Brown Story. He received his M.Sc. from Kansas State University and an MBA from Emporia State University and served in the United States Air Force from 1967-1971.

Reviews

"The editor, John Vacca, has pulled together contributions from a large number of experts into a massive tome that touches on pretty much every angle of security and privacy. ...it’s hard to think of anyone with any interest in infosecurity who wouldn’t get something out of it.

This is the reference work you want on your bookshelf when you need to quickly get a grounding in some new aspect of security." --Network Security Newsletter

Ask a Question About this Product More...
 
Look for similar items by category
Item ships from and is sold by Fishpond World Ltd.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.