Computer and information security handbook [electronic resource] /
edited by John R. Vacca.
imprint
Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, c2009.
description
xxxii, 844 p. : ill. ; 29 cm.
ISBN
0123743540, 9780123743541
format(s)
Book
More Details
added author
imprint
Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, c2009.
isbn
0123743540
9780123743541
restrictions
Licensed for access by U. of T. users.
contents note
Overview of system and network security : a comprehensive introduction / John Mallery -- A cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- The botnet problem / Xinyuan Wang and Daniel ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A: Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B: Security management and resiliency / John R. Vacca -- Appendix C: List of top security implementation and deployment companies -- Appendix D: List of security products -- Appendix E: List of security standards -- Appendix F: List of miscellaneous security resources -- Appendix G: Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H: Configuring wireless internet security remote access -- Appendix I: Frequently asked questions -- Appendix J: Glossary.
catalogue key
7877554
 
Includes bibliographical references and index.
A Look Inside
Full Text Reviews
Appeared in Choice on 2010-01-01:
This comprehensive handbook features 43 chapters organized into seven parts and ten appendixes. The chapters are individually authored by academic, industry, or government experts in their respective areas. As with many edited collections, there is considerable variation in style and length among the chapters. Some are introductory or describe general concepts, others delve into technical details, and yet others offer specific examples. A few chapters provide a reference list, and many include key footnotes. The first part of the book introduces system and network security while the second deals with security management issues. The next two parts focus on encryption and privacy and access topics. The last three address storage security and the essentials of physical and advanced security. The appendixes include several lists of relevant resources, an FAQ section, a glossary, and more; there is also an extensive index. This handbook is a timely, valuable reference for security professionals, researchers, and students. Clearly, a great amount of time and effort went into its creation and compilation. Summing Up: Highly recommended. Upper-division undergraduate through professional collections. E. M. Aupperle emeritus, University of Michigan
Reviews
Review Quotes
"I believe that this book contains something for everyone no matter what your experience level or specialty in the information security field. I think John did a great job putting together this handbook and the team of experts to deliver this information and I would recommend this book for anyone in the information security field."-- PenTestMag.com, March 2012, page 1
"I believe that this book contains something for everyone no matter what your experience level or specialty in the information security field. I think John did a great job putting together this handbook and the team of experts to deliver this information and I would recommend this book for anyone in the information security field."-- PenTestMag.com, March 2012, page 1 "[T]here is a lot of information covering many topics contained within this book making it a valuable desk reference book or a textbook for a course in Information Security. I believe that this book contains something for everyone no matter what your experience level or specialty in the information security field. I think John did a great job putting together this handbook and the team of experts to deliver this information and I would recommend this book for anyone in the information security field. "--PenTest Extra, June 2012, page 54
R1: Tom Karygiannis/Senior Research Scientist, NIST "The author has assembled an excellent team of chapter authors. Each chapter is devoted to a particular topic. It seems that each chapter would serve as a good primer for the topic, but someone interested in that specific topic would have to buy books dedicated to that specific topic to round out their knowledge on the subject.... The best and possibly the widest audience is professionals that are not computer security experts and are looking for a primer on various computer security topics....[Author is] very well known, and one of the major strengths of the proposal." R2-- David Harley, Independent Security Author (Syngress, etc.) and Consultant/UK: "Its main strengths are the authoring experience of its editor, and the fact that it calls upon a wide range of authors to address a wide range of topics that might well appeal to those in need of a comprehensive but fairly general resource. Its weaknesses are that the proposal has a few gaps in coverage addressed above."
This item was reviewed in:
Choice, January 2010
To find out how to look for other reviews, please see our guides to finding book reviews in the Sciences or Social Sciences and Humanities.
Summaries
Back Cover Copy
Computer and Information Security Handbook is the culmination of over 40 chapters contributed by distinguished Computer and Information Security experts and carefully edited by John R. Vacca. The immediate and long term challenges that security professionals face are investigated. Computer Security theory, technology, advancements and practices are discussed in depth and from multiple viewpoints, enabling the implementation of practical solutions to any challenge security professionals may encounter. Learn how to analyze risks to networks such as audit trails IP sniffing/snooping and the steps necessary to deploy appropriate countermeasures to reduce your exposure to physical and network threats. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. Coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. This rich collection of Security practice and theory is a "must-have" for any security professional. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Back Cover Copy
Computer and Information Security Handbook is the culmination of over 40 chapters contributed by distinguished Computer and Information Security experts and carefully edited by John R. Vacca. The immediate and long term challenges that security professionals face are investigated. Computer Security theory, technology, advancements and practices are discussed in depth and from multiple viewpoints, enabling the implementation of practical solutions to any challenge security professionals may encounter.Learn how to analyze risks to networks such as audit trails IP sniffing/snooping and the steps necessary to deploy appropriate countermeasures to reduce your exposure to physical and network threats. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. Coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. This rich collection of Security practice and theory is a "must-have" for any security professional.Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise.This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Bowker Data Service Summary
This text presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats.
Main Description
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Main Description
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Main Description
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Main Description
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate counter measures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation. A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications. This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security. KEY FEATURES * Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. * This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
Table of Contents
Overview of System and Network Security: A Comprehensive Introduction
Building a Secure Organization
A Cryptography Primer
Preventing System Intrusions
Guarding Against Network Intrusions
UNIX and Linux Security
Linux and UNIX Security
Internet Security
Internet Security: The Botnet Problem in Internet Security
Intranet Security
Local Area Network (LAN) Security
Wireless Network Security
Cellular Network Security
RFID Security
Managing Information Security
Security Essentials for IT Managers: Protecting Mission-Critical Systems
Security Management Systems
IT Security Management
ID Management
Intrusion Detection and Prevention Systems
Computer Forensics
Network Forensics
Firewalls
Penetration Testing
Vulnerability Assessment
Encryption Technology
Data Encryption
Satellite Encryption
Public Key Infrastructure
Instant Messaging Security
Privacy and Access Management
Net Privacy
Personal Privacy Policies
Virtual Private Networks
Identity Theft
VoIP Security
Storage Security
SAN Security
Storage Area Network Security
Risk Management
Storage Security
Physical Security Essentials
Biometerics
Homeland Security
Information Warfare
Advanced Security
Security Through Diversity
Online Reputation
Content Filtering
Data Loss Protection (DLP)
Appendices
Configuring Authentication Service On Microsoft Windows Vista
Security Management and Resiliency
List Of Top Security Implementation And Deployment Companies
List Of Security Products
List Of Security Standards
List Of Miscellaneous Security Resources
Ensuring Built-in Frequency Hopping Spread Spectrum Wireless Network Security
Configuring Wireless Internet Security Remote Access
Frequently Asked Questions
Glossary
Table of Contents provided by Publisher. All Rights Reserved.

This information is provided by a service that aggregates data from review sources and other sources that are often consulted by libraries, and readers. The University does not edit this information and merely includes it as a convenience for users. It does not warrant that reviews are accurate. As with any review users should approach reviews critically and where deemed necessary should consult multiple review sources. Any concerns or questions about particular reviews should be directed to the reviewer and/or publisher.

  link to old catalogue

Report a problem