Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Information security handbook / edited by Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R.S. Tavares. [O'Reilly electronic resource]

Edition First edition.
Publication Info. Boca Raton, FL : CRC Press, 2022.
©2022
QR Code
Description 1 online resource : illustrations.
Series Internet of everything (IoE): security and privacy paradigm
Internet of everything (IoE). Security and privacy paradigm.
Bibliography Includes bibliographical references and index.
Contents 1. Information Security Introduction. 2. History and Background of IS. 3. Security in Personal Computers. 4. Security in Gadgets. 5. Banking Threats and Counter Measures. 6. Cryptocurrencies Threats and Counter Measures. 7. Blockchain Security Issues. 8. Power plant Systems Threats and Counter Measures. 9. Security in Avionics Systems. 10. Big Data and Security Issues. 11. Security in Cloud Computing. 12. Clusters Security. 13. Information Security in the Modern Enterprise. 14. Information Security in IIoT. 15. Building a Secure Organization. 16. Detecting System Intrusions. 17. Preventing System Intrusions. 18. Guarding Against Network Intrusions. 19. Information Security in Industry 4.0. 20. Securing Web Applications, Services and Servers. 21. Internet Security. 22. The Botnet Issues. 23. Intranet Security Issues. 24. Wireless Network Security. 25. Wireless Body Area Security. 26. Wireless Sensor Network Security. 27. Security for the Internet of Things. 28. Information Security of E-Health Applications. 29. Cellular Network Security. 30. Security Risk Management. 31. Information Security Essentials for IT Professionals. 32. Protecting and or safeguarding Mission-Critical Systems. 33. Security Management Systems (SMS). 34. Information Security in Fog Cloud. 35. Private Cloud Security. 36. Virtual Private Cloud Security. 37. Protecting Virtual Infrastructure. 38. SDN and NFV Security. 39. Cyber-Physical Systems Security. 40. Penetration Testing. 41. Access Controls. 42. Endpoint Security. 43. Securing the Infrastructure. 44. Cyber Warfare.
Summary "This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts, serves as a manual for industry, while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through IoT ecosystem and implications to the real world and at the same time explains the concepts of IoT-related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful"-- Provided by publisher.
Subject Computer networks -- Security measures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer networks -- Security measures
Added Author Zaman, Noor, 1972- editor.
Hussain, Khalid, editor.
Humayun, Mamoona, editor.
Abdullah, Azween Bin, 1961- editor.
Tavares, João Manuel R. S., editor.
Other Form: Print version: Information security handbook First edition. Boca Raton : CRC Press, [2022] 9780367365721 (DLC) 2021043552
ISBN 9780367808228 electronic book
0367808226 electronic book
9781000540567 electronic book
1000540561 electronic book
9781000540550 electronic book
1000540553 electronic book
hardcover
paperback
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information