Computer Security Handbook

Besorgungstitel - wird vorgemerkt | Lieferzeit: Besorgungstitel - Lieferbar innerhalb von 10 Werktagen I
Alle Preise inkl. MwSt. | Versandkostenfrei
Nicht verfügbar Zum Merkzettel
Gewicht:
3456 g
Format:
254x177x76 mm
Beschreibung:

Seymour Bosworth, CDP, is president of S. Bosworth & Associates, Plainview, New York, a management consulting firm active in computing applications for banking, commerce, and industry. Since 1972 Bosworth has been a contributing editor to all four editions of the Computer Security Handbook, and he has written many articles and lectured extensively about computer security and other technical and managerial subjects. He has been responsible for design and manufacture, system analysis, programming, and operations of both digital and analog computers.
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences.
Preface
 
Acknowledgments
 
About the Editors
 
About the Contributors
 
A Note to Instructors
 
PART I FOUNDATIONS OF COMPUTER SECURITY
 
Chapter 1 Brief History and Mission of Information System Security (Seymour Bosworth and Robert V. Jacobson)
 
Chapter 2 History of Computer Crime
 
Chapter 3 Toward a New Framework for Information Security (Donn B. Parker, CISSP)
 
Chapter 4 Hardware Elements of Security (Sy Bosworth and Stephen Cobb)
 
Chapter 5 Data Communications and Information Security (Raymond Panko and Eric Fisher)
 
Chapter 6 Local Area Network Topologies, Protocols, and Design (Gary C. Kessler)
 
Chapter 7 Encryption (Stephen Cobb and Corinne LeFrançois)
 
Chapter 8 Using a Common Language for Computer Security Incident Information (John D. Howard)
 
Chapter 9 Mathematical Models of Computer Security (Matt Bishop)
 
Chapter 10 Understanding Studies and Surveys of Computer Crime (M. E. Kabay)
 
Chapter 11 Fundamentals of Intellectual Property Law (William A. Zucker and Scott J. Nathan)
 
PART II THREATS AND VULNERABILITIES
 
Chapter 12 The Psychology of Computer Criminals (Q. Campbell and David M. Kennedy)
 
Chapter 13 The Insider Threat (Gary L. Tagg, CISSP)
 
Chapter 14 Information Warfare (Seymour Bosworth)
 
Chapter 15 Penetrating Computer Systems and Networks (Chey Cobb, Stephen Cobb, M. E. Kabay, and Tim Crothers)
 
Chapter 16 Malicious Code (Robert Guess and Eric Salveggio)
 
Chapter 17 Mobile Code (Robert Gezelter)
 
Chapter 18 Denial-of-Service Attacks (Gary C. Kessler)
 
Chapter 19 Social-engineering and low-tech attacks (Karthik Raman, Susan Baumes, Kevin Beets, and Carl Ness)
 
Chapter 20 Spam, Phishing, and Trojans: Attacks Meant To Fool (Stephen Cobb)
 
Chapter 21 Web-Based Vulnerabilities (Anup K. Ghosh, Kurt Baumgarten, Jennifer Hadley, and Steven Lovaas)
 
Chapter 22 Physical Threats to the Information Infrastructure (Franklin Platt)
 
PART III PREVENTION: TECHNICAL DEFENSES
 
Chapter 23 Protecting the Physical Information Infrastructure (Franklin Platt)
 
Chapter 24 Operating System Security (William Stallings)
 
Chapter 25 Local Area Networks (N. Todd Pritsky, Joseph R. Bumblis, and Gary C. Kessler)
 
Chapter 26 Gateway Security Devices (Justin Opatrny)
 
Chapter 27 Intrusion Detection and Intrusion Prevention Devices (Rebecca Gurley Bace)
 
Chapter 28: Identification and Authentication (Ravi Sandhu, Jennifer Hadley, Steven Lovaas, and Nicholas Takacs)
 
Chapter 29: Biometric Authentication (Eric Salveggio, Steven Lovaas, David R. Lease, and Robert Guess)
 
Chapter 30: E-Commerce and Web Server Safeguards (Robert Gezelter)
 
Chapter 31: Web Monitoring and Content Filtering (Steven Lovaas)
 
Chapter 32 Virtual Private Networks and Secure Remote Access (Justin Opatrny and Carl Ness
 
Chapter 33 802.11 Wireless LAN Security (Gary L. Tagg, CISSP and Jason Sinchak, CISSP)
 
Chapter 34 Securing VoIP (Christopher Dantos and John Mason)
 
Chapter 35 Securing P2P, IM, SMS, and Collaboration Tools (Carl Ness)
 
Chapter 36 Securing Stored Data (David J. Johnson, Nicholas Takacs, Jennifer Hadley, and M. E. Kabay)
 
Chapter 37: PKI and Certificate Authorities (Santosh Chokhani, Padgett Peterson, and Steven Lovaas)
 
Chapter 38: Writing Secure Code (Lester E. Nichols, M. E. Kabay, and Timothy Braithwaite)
 
Chapter 39 Software Development and Quality Assurance (Diane E. Levine, John Mason, and Jennifer Hadley)
 
Chapter 40: Managing Software Patches and Vulnerabilities (Karen Scarfone, Peter Mell, and M
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.