Computer Security Handbook
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Computer Security Handbook

 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780471269755
Veröffentl:
2002
Einband:
E-Book
Seiten:
1224
Autor:
Seymour Bosworth
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security. * Chapters are contributed by recognized experts in the industry. * This title has come to be known as "e;Big Blue"e; in industry circles and has a reputation for being the reference for computer security issues.
This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security.* Chapters are contributed by recognized experts in the industry.* This title has come to be known as "Big Blue" in industry circles and has a reputation for being the reference for computer security issues.
PART ONE: FOUNDATIONS OF COMPUTER SECURITY.Brief History and Mission of Information System Security (S. Bosworth & R. Jacobson).Cyberspace Law and Computer Forensics (R. Heverly & M. Wright).Using a "Common Language" for Computer Security Incident Information (J. Howard & P. Meunier).Studies and Surveys of Computer Crime (M. Kabay).Toward a New Framework for Information Security (D. Parker).PART TWO: THREATS AND VULNERABILITIES.The Psychology of Computer Criminals (Q. Campbell & D. Kennedy).Information Warfare (S. Bosworth).Penetrating Computer Systems and Networks (C. Cobb, et al.).Malicious Code (R. Thompson).Mobile Code (R. Gezelter).Denial of Service Attacks (D. Levine & G. Kessler).The Legal Framework for Protecting Intellectual Property in the Field of Computing and Computer Software (W. Zucker & S. Nathan).E-Commerce Vulnerabilities (A. Ghosh).Physical Threats to the Information Infrastructure (F. Platt).PART THREE: PREVENTION: TECHNICAL DEFENSES.Protecting the Information Infrastructure (F. Platt).Identification and Authentication (R. Sandhu).Operating System Security (W. Stallings).Local Area Networks (G. Kessler & N. Pritsky).E-Commerce Safeguards (J. Ritter & M. Money).Firewalls and Proxy Servers (D. Brussin).Protecting Internet-Visible Systems (R. Gezelter).Protecting Web Sites (R. Gezelter).Public Key Infrastructures and Certificate Authorities (S. Chokhani).Antivirus Technology (C. Cobb).Software Development and Quality Assurance (D. Levine).Piracy and Antipiracy Techniques (D. Levine).PART FOUR: PREVENTION: HUMAN FACTORS.Standards for Security Products (P. Brusil & N. Zakin).Security Policy Guidelines (M. Kabay).Security Awareness (K. Rudolph, et al.).Ethical Decision Making and High Technology (J. Linderman).Employment Practices and Policies (M. Kabay).Operations Security and Production Controls (M. Walsh & M. Kabay).E-Mail and Internet Use Policies (M. Kabay).Working with Law Enforcement (M. Wright).Using Social Psychology to Implement Security Policies (M. Kabay).Auditing Computer Security (D. Levine).PART FIVE: DETECTION.Vulnerability Assessment and Intrusion Detection Systems (R. Bace).Monitoring and Control Systems (D. Levine).Application Controls (M. Walsh).PART SIX: REMEDIATION.Computer Emergency Quick-Response Teams (B. Cowens & M. Miora).Data Backups and Archives (M. Kabay).Business Continuity Planning (M. Miora).Disaster Recovery (M. Miora).Insurance Relief (R. Parisi, Jr.).PART SEVEN: MANAGEMENT'S ROLE.Management Responsibilities and Liabilities (C. Hallberg, et al.).Developing Security Policies (M. Kabay).Risk Assessment and Risk Management (R. Jacobson).Y2K: Lessons Learned for Computer Security (T. Braithwaite).PART EIGHT: OTHER CONSIDERATIONS.Medical Records Security (P. Brusil & D. Harley).Using Encryption Internationally (D. Levine).Censorship and Content Filtering (L. Tien & S. Finkelstein).Privacy in Cyberspace (B. Hayes, et al.).Anoymity and Identity in Cyberspace (M. Kabay).The Future of Information Security (P. Tippett).Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.