Online Library TheLib.net » Computer and information security handbook
cover of the book Computer and information security handbook

Ebook: Computer and information security handbook

00
27.01.2024
0
0
Overview of system and network security: a comprehensive introduction /, A cryptography primer /, Preventing system intrusions /, Guarding against network intrusions /, Unix and Linux security /, Eliminating the security weakness of Linux and Unix operating systems /, Internet security /, The botnet problem /, Intranet security /, Local area network security /, Wireless network security /, Cellular network security /, RFID security /, Information security essentials for IT managers, protecting mission-critical systems /, Security management systems /, Information technology security management /, Identity management /, Intrusion prevention and detection systems /, Computer forensics /, Network forensics /, Firewalls /, Penetration testing /, What is vulnerability assessment? /, Data encryption /, Satellite encryption /, Public key infrastructure /, Instant-messaging security /, NET privacy /, Personal privacy policies /, Virtual private networks /, Identity theft /, VoIP security /, SAN security /, Storage area networking devices security /, Risk management /, Physical security essentials /, Biometrics /, Homeland security /, Information warfare /, Security through diversity /, Reputation management /, Content filtering /, Data loss protection /, Configuring authentication service on Microsoft Windows Vista /, Security management and resiliency /, List of top security implementation and deployment companies --, List of security products --, List of security standards --, List of miscellaneous security resources --, Ensuring built-in frequency hopping spread spectrum wireless network security --, Configuring wireless internet security remote access --, Frequently asked questions --; John Mallery --, Scott R. Ellis --, Michael West --, Tom Chen and Patrick J. Walsh --, Gerald Beuchelt --, Mario Santana --, Jesse Walker --, Xinyuan Wang and Daniel ramsbrock --, Bill Mansoor --, Pramod Pandya --, Chunming Rong and Erdal Cayirci --, Peng Liu, Thomas F. LaPorta and Kameswari Kotapati --, Chunming Rong and Erdal Cayirci --, Albert Caballero --, Joe Wright and Jim Harmening --, Rahul Bhasker and Bhushan Kapoor --, Jean-Marc Seigneur and Tewfiq El Malika --, Christopher Day --, Scott R. Ellis --, Yong Guan --, Errin W. Fulp --, Sanjay Bavisi --, Almantas Kakareka --, Bhushan Kapoor and Pramod Pandya --, Daniel S. Soper --, Terence Spies --, Samuel J.J. Curry --, Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna --, George Yee and Larry Korba --, Jim Harmening and Joe Wright --, Markus Jacobsson and Alex Tsow --, Dan Wing and Harsh Kupwade Patil --, John McGowan, Jeffrey Bardin and John McDonald --, Robert Rounsavall --, Sokratis K. Katsikas --, William Stallings --, Luther Martin --, Rahul Bhaskar and Bhushan Kapoor --, Jan Eloff and Anna Granova --, Kevin Noble --, Jean-Marc Seigneur --, Peter Nicoletti --, Ken Perkins --, John R. Vacca --, John R. Vacca

Download the book Computer and information security handbook for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen