Ebook: Computer and information security handbook
Author: John R. Vacca (editor)
- Genre: Computers // Security
- Tags: Информатика и вычислительная техника, Информационная безопасность
- Series: The Morgan Kaufmann series in computer security
- Year: 2009
- Publisher: Morgan Kaufmann
- Edition: 1
- Language: English
- pdf
Overview of system and network security: a comprehensive introduction /, A cryptography primer /, Preventing system intrusions /, Guarding against network intrusions /, Unix and Linux security /, Eliminating the security weakness of Linux and Unix operating systems /, Internet security /, The botnet problem /, Intranet security /, Local area network security /, Wireless network security /, Cellular network security /, RFID security /, Information security essentials for IT managers, protecting mission-critical systems /, Security management systems /, Information technology security management /, Identity management /, Intrusion prevention and detection systems /, Computer forensics /, Network forensics /, Firewalls /, Penetration testing /, What is vulnerability assessment? /, Data encryption /, Satellite encryption /, Public key infrastructure /, Instant-messaging security /, NET privacy /, Personal privacy policies /, Virtual private networks /, Identity theft /, VoIP security /, SAN security /, Storage area networking devices security /, Risk management /, Physical security essentials /, Biometrics /, Homeland security /, Information warfare /, Security through diversity /, Reputation management /, Content filtering /, Data loss protection /, Configuring authentication service on Microsoft Windows Vista /, Security management and resiliency /, List of top security implementation and deployment companies --, List of security products --, List of security standards --, List of miscellaneous security resources --, Ensuring built-in frequency hopping spread spectrum wireless network security --, Configuring wireless internet security remote access --, Frequently asked questions --; John Mallery --, Scott R. Ellis --, Michael West --, Tom Chen and Patrick J. Walsh --, Gerald Beuchelt --, Mario Santana --, Jesse Walker --, Xinyuan Wang and Daniel ramsbrock --, Bill Mansoor --, Pramod Pandya --, Chunming Rong and Erdal Cayirci --, Peng Liu, Thomas F. LaPorta and Kameswari Kotapati --, Chunming Rong and Erdal Cayirci --, Albert Caballero --, Joe Wright and Jim Harmening --, Rahul Bhasker and Bhushan Kapoor --, Jean-Marc Seigneur and Tewfiq El Malika --, Christopher Day --, Scott R. Ellis --, Yong Guan --, Errin W. Fulp --, Sanjay Bavisi --, Almantas Kakareka --, Bhushan Kapoor and Pramod Pandya --, Daniel S. Soper --, Terence Spies --, Samuel J.J. Curry --, Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --, George Yee and Larry Korba --, Jim Harmening and Joe Wright --, Markus Jacobsson and Alex Tsow --, Dan Wing and Harsh Kupwade Patil --, John McGowan, Jeffrey Bardin and John McDonald --, Robert Rounsavall --, Sokratis K. Katsikas --, William Stallings --, Luther Martin --, Rahul Bhaskar and Bhushan Kapoor --, Jan Eloff and Anna Granova --, Kevin Noble --, Jean-Marc Seigneur --, Peter Nicoletti --, Ken Perkins --, John R. Vacca --, John R. Vacca
Download the book Computer and information security handbook for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)