The Locator -- [(author = "Vacca John R")]

23 records matched your query       


Record 3 | Previous Record | MARC Display | Next Record | Search Results
Title:
Computer and information security handbook / edited by John R. Vacca.
Edition:
Third edition.
Publisher:
Morgan Kaufmann Publishersan imprint of Elsevier
Copyright Date:
2017
Description:
xli, 1237 pages : illustrations ; 28 cm
Subject:
Computer security.
Computer networks--Security measures.
Data protection.
Rechnernetz
Computersicherheit.
Datensicherung
Informationssystem
Datenschutz
Computer networks--Security measures
Computer security
Data protection.
Other Authors:
Vacca, John R., editor.
Notes:
Includes bibliographical references and index.
Contents:
79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya. 16. Local area network security (online chapter) / Pramod Pandya -- 17. Wireless network security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 18. Wireless sensor network security: the internet of things / Harsh Kupwade Patil, Thomas M. Chen -- 19. Security for the internet of things / William Stallings -- 20. Cellular network security / Peng Liu, Thomas F. LaPorta, Kameswari Kotapati -- 21. Radio frequency identification security / Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng -- 22. Optical network security (online chapter) / Lauren Collins -- 23. Optical wireless security (online chapter) / Scott R. Ellis -- Part II. Managing information security -- 24. Information security essentials for information technology managers: protecting mission-critical systems / Albert Caballero -- 25. Security management systems / Jim Harmening -- 26. Policy-driven system management / Henrik Plate, Cataldo Basile, Stefano Paraboschi-- 27. Information technology security management (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 28. The enemy (the intruder's genesis) (online chapter) / Pramod Pandya -- 29. Social engineering deceptions and defenses / Scott R. Ellis -- 30. Ethical hacking / Scott R. Ellis -- 31. What is vulnerability assessment? / Almantas Kakareka -- 32. Security metrics: an introduction and literature review (online chapter) / George O.M. Yee -- 33. Security education, training, and awareness / Albert Caballero -- 34. Risk management / Sokratis K. Katsikas -- 35. Insider threat / William F. Gross -- Part III. Disaster recovery security -- 36. Disaster recovery / Scott R. Ellis, Lauren Collins -- 37. Disaster recovery plans for small and medium businesses (SMBs) / William F. Gross, Jr. -- Part IV. Security standards and policies -- 38. Security certification and standards implementation / Keith Lewis -- 39. Security policies and plans development / Keith Lewis-- Part V. Cyber, network, and systems forensics security and assurance -- 40. Cyber forensics / Scott R. Ellis -- 41. Cyber forensics and incidence response / Cem Gurkok -- 42. Securing e-discovery / Scott R. Ellis -- 43. Network forensics (online chapter) / Yong Guan -- 44. Microsoft Office and metadata forensics: a deeper dive / Rich Hoffman -- 45. Hard drive imaging / John Benjamin Khan -- Part VI. Encryption technology -- 46. Data encryption (online chapter) / Bhushan Kapoor, Pramod Pandya -- 47. Satellite encryption / Daniel S. Soper -- 48. Public key infrastructure / Terence Spies -- 49. Password-based authenticated key establishment protocols (online chapter) / Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan, Feng Hao -- 50. Context-aware multifactor authentication survey / Emin Huseynov, Jean-Marc Seigneur -- 51. Instant-messaging security / Samuel J.J. Curry -- Part VII. Privacy and access management -- 52. Online privacy / Chiara Braghin, Marco Cremonini-- 53. Privacy-enhancing technologies / Simone Fischer-Hbner, Stevan Berthold -- 54. Personal privacy policies (online chapter) / George O.M. Yee, Larry Korba -- 55. Detection of conflicts in security policies / Cataldo Basile, Matteo Maria Casalino, Simone Mutti, Stefano Paraboschi -- 56. Supporting user privacy preferences in digital interactions / Sara Foresti, Pierangela Samarati -- 57. Privacy and security environmental monitoring systems: issues and solutions / Sabrina De Capitani di Vimercati, Angelo Genovese, Giovanni Livraga, Vincenzo Piuri, Fabio Scotti -- 58. Virtual private networks / James T. Harmening -- 59. Identity theft (online chapter) / Markus Jakobsson, Alex Tsow -- Part VIII. Storage security -- 61. SAN security (online chapter) / John McGowan, Jeffrey S. Bardin, John McDonald -- 62. Storage area networking security devices / Robert Rounsavall -- Part IX. Cloud security -- 63. Securing cloud computing systems / Cem Gurkok -- 64. Cloud security / Edward G. Amoroso-- 65. Private cloud security / Keith Lewis -- 66. Virtual private cloud security / Keith Lewis -- Part X. Virtual security -- 67. Protecting virtual infrastructure / Edward G. Amoroso -- 68. Software-defined networking and network function virtualization security / Edward G. Amoroso -- Part XI. Cyber physical security -- 69. Physical security essentials / William Stallings -- 70. Biometrics (online chapter) / Luther Martin -- Part XII. Practical security -- 71. Online identity and user management services / Tewfiq El Maliki, Jean-Marc Seigneur -- 72. Intrusion prevention and detection systems / Christopher Day -- 73. Transmission control protocol/internet protocol packet analysis (online chapter) / Pramod Pandya -- 74. Firewalls (online chapter) / Errin W. Fulp -- 75. Penetration testing / Roman Zabicki, Scott R. Ellis -- 76. System security (online chapter) / Lauren Collins -- 77. Access controls / Lauren Collins -- 78. Endpoint security / Keith Lewis-- 79. Assessments and audits (online chapter) / Lauren Collins -- 80. Fundamentals of cryptography / Scott R. Ellis -- Part XIII. Critical infrastructure security -- 81. Securing the infrastructure / Lauren Collins -- 82. Homeland security (online chapter) / Rahul Bhaskar, Bhushan Kapoor -- 83. Cyber warfare / Anna Granova, Marco Slaviero -- 84. Cyber-attack process / Nailah Mims -- Part XIV. Advanced security -- 85. Security through diversity / Kevin Noble -- 86. e-Reputation management and online reputation management survey / Jean-Marc Seigneur -- 87. Content filtering (online chapter) / Pete F. Nicoletti -- 88. Data loss protection / Ken Perkins -- 89. Satellite cyber attack search and destroy / Jeffrey Bardin -- 90. Verifiable voting systems (online chapter) / Thea Peacock, Peter Y.A. Ryan, Steve Schneider, Zhe Xia -- 91. Advanced data encryption / Pramod Pandya.
Summary:
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- Adapted from publisher's description.
ISBN:
0128038438
9780128038437
OCLC:
(OCoLC)966205097
LCCN:
2016952601
Locations:
PQAX094 -- Wartburg College - Vogel Library (Waverly)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.