Computer and Information Security Handbook, 2nd Edition
- Length: 1200 pages
- Edition: 2
- Language: English
- Publisher: Morgan Kaufmann
- Publication Date: 2013-06-07
- ISBN-10: 0123943973
- ISBN-13: 9780123943972
- Sales Rank: #509605 (See Top 100 Books)
The Computer and Information Security Handbook, 2nd Edition provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
- Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise
- Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints
- Presents methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions
Table of Contents
Part I Overview Of System And Network Security: A Comprehensive Introduction
Chapter 1 Building A Secure Organization
Chapter 2 A Cryptography Primer
Chapter 3 Detecting System Intrusions
Chapter 4 Preventing System Intrusions
Chapter 5 Guarding Against Network Intrusions
Chapter 6 Securing Cloud Computing Systems
Chapter 7 Fault Tolerance And Resilience In Cloud Computing Environments
Chapter 8 Securing Web Applications, Services And Servers
Chapter 9 Unix And Linux Security
Chapter 10 Eliminating The Security Weakness Of Linux And Unix Operating Systems
Chapter 11 Internet Security
Chapter 12 The Botnet Problem
Chapter 13 Intranet Security
Chapter 14 Local Area Network Security
Chapter 15 Wireless Network Security
Chapter 16 Wireless Sensor Network Security
Chapter 17 Cellular Network Security
Chapter 18 Rfid Security
Chapter 19 Optical Network Security
Chapter 20 Optical Wireless Security
Part II Managing Information Security
Chapter 21 Information Security Essentials For It Managers: Protecting Mission-Critical Systems
Chapter 22 Security Management Systems
Chapter 23 Policy-Driven System Management
Chapter 24 Information Technology Security Management
Chapter 25 Online Identity And User Management Services
Chapter 26 Intrusion Prevention And Detection Systems
Chapter 27 Tcp/Ip Packet Analysis
Chapter 28 The Enemy (The Intruder’S Genesis)
Chapter 29 Firewalls
Chapter 30 Penetration Testing
Chapter 31 What Is Vulnerability Assessment?
Chapter 32 Security Metrics: An Introduction And Literature Review
Part III Cyber, Network, And Systems Forensics Security And Assurance
Chapter 33 Cyber Forensics
Chapter 34 Cyber Forensics And Incidence Response
Chapter 35 Securing E-Discovery
Chapter 36 Network Forensics
Part IV Encryption Technology
Chapter 37 Data Encryption
Chapter 38 Satellite Encryption
Chapter 39 Public Key Infrastructure
Chapter 40 Password-Based Authenticated Key Establishment Protocol
Chapter 41 Instant-Messaging Security
Part V Privacy And Access Management
Chapter 42 Privacy On The Internet
Chapter 43 Privacy-Enhancing Technologies
Chapter 44 Personal Privacy Policies
Chapter 45 Detection Of Conflicts In Security Policies
Chapter 46 Supporting User Privacy Preferences In Digital Interactions
Chapter 47 Privacy And Security In Environmental Monitoring Systems: Issues And Solutions
Chapter 48 Virtual Private Networks
Chapter 49 Identity Theft
Chapter 50 Voip Security
Part VI Storage Security
Chapter 51 San Security
Chapter 52 Storage Area Networking Security Devices
Chapter 53 Risk Management
Part VII Physical Security
Chapter 54 Physical Security Essentials
Chapter 55 Disaster Recovery
Chapter 56 Biometrics
Chapter 57 Homeland Security
Chapter 58 Cyber Warfare
Chapter 59 System Security
Chapter 60 Securing The Infrastructure
Chapter 61 Access Controls
Chapter 62 Assessments And Audits
Chapter 63 Fundamentals Of Cryptography
Part IX Advanced Security
Chapter 64 Security Through Diversity
Chapter 65 Online E-Reputation Management Services
Chapter 66 Content Filtering
Chapter 67 Data Loss Protection
Chapter 68 Satellite Cyber Attack Search And Destroy
Chapter 69 Verifiable Voting Systems
Chapter 70 Advanced Data Encryption
Part X Appendices
Appendix A Configuring Authentication Service On Microsoft Windows 7
Appendix B Security Management And Resiliency
Appendix C List Of Top Information And Network Security Implementation And Deployment Companies
Appendix D List Of Security Products
Appendix E List Of Security Standards
Appendix F List Of Miscellaneous Security Resources
Appendix G Ensuring Built-In Frequency Hopping Spread Spectrum Wireless Network Security
Appendix H Configuring Wireless Internet Security Remote Access
Appendix I Frequently Asked Questions
Appendix J Case Studies