Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Computer security handbook. [O'Reilly electronic resource]

Edition 5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne.
Imprint Hoboken, N.J. : John Wiley & Sons, ©2009.
QR Code
Description 1 online resource (2 volumes) : illustrations
Bibliography Includes bibliographical references and index.
Contents Brief history and mission of information system security / Seymour Bosworth and Robert V. Jacobson -- History of computer crime / M.E. Kabay -- Toward a new framework for information security / Donn B. Parker -- Hardware elements of security / Seymour Bosworth and Stephen Cobb -- Data communications and information security / Raymond Panko -- Network topologies, protocols, and design / Gary C. Kessler and N. Todd Pritsky -- Encryption / Stephen Cobb and Corinne Lefrancois -- Using a common language for computer security incident information / John D. Howard -- Mathematical models of computer security / Matt Bishop -- Understanding studies and surveys of computer crime / M.E. Kabay -- Fundamentals of intellectual property law / William A. Zucker and Scott J. Nathan.
Psychology of computer criminals / Q. Campbell and David M. Kennedy -- Dangerous information technology insider: psychological characteristics and career patterns / Jerrold M. Post -- Information warfare / Seymour Bosworth -- Penetrating computer systems and networks / Chey Cobb, Stephen Cobb, and M.E. Kabay -- Malicious code / Robert Guess and Eric Salveggio -- Mobile code / Robert Gezelter -- Denial-of-service attacks / Gary C. Kessler and Diane E. Levine -- Social engineering and low-tech attacks / Karthik Raman ... [and three others] -- Spam, phishing, and Trojans: attacks meant to fool / Stephen Cobb -- Web-based vulnerabilities / Anup K. Ghosh ... [and three others] -- Physical threats to the information infrastructure / Franklin Platt.
Protecting the information infrastructure / Franklin Platt -- Operating system security / William Stallings -- Local area networks / Gary C. Kessler and N. Todd Pritsky -- Gateway security devices / David Brussin and Justin Opatrny -- Intrusion detection and intrusion prevention devices / Rebecca Gurley Bace -- Identification and authentication / Ravi Sandhu ... [and three others] -- Biometric authentication / David R. Lease ... [and three others] -- E-commerce and Web server safeguards / Robert Gezelter -- Web monitoring and content filtering / Steven Lovaas -- Virtual private networks and secure remote access / Justin Opatrny -- 802.11 wireless LAN security / Gary L. Tagg -- Securing VoIP / Christopher Dantos and John Mason -- Securing P2P, IM, SMS, and collaboration tools / Carl Ness -- Securing stored data / David J. Johnson, Nicholas Takacs, and Jennifer Hadley -- PKI and certificate authorities / Santosh Chokhani, Padgett Peterson, and Steven Lovaas -- Writing secure code / Lester E. Nichols, M.E. Kabay, and Timothy Braithwaite -- Software development and quality assurance / John Mason, Jennifer Hadley, and Diane E. Levine -- Managing software patches and vulnerabilities / Peter Mell and Karen Kent -- Antivirus technology / Chey Cobb and Allysa Myers -- Protecting digital rights: technical approaches / Robert Guess ... [and three others].
Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines / M.E. Kabay and Bridgitt Robertson -- Employment practices and policies / M.E. Kabay and Bridgitt Robertson -- Vulnerability assessment / Rebecca Gurley Bace -- Operations security and production controls / M.E. Kabay, Don Holden, and Myles Walsh -- E-mail and Internet use policies / M.E. Kabay and Nicholas Takacs -- Implementing a security awareness program / K. Rudolph -- Using social psychology to implement security policies / M.E. Kabay ... [and three others] -- Security standards for products / Paul J. Brusil and Noel Zakin.
Application controls / Myles Walsh -- Monitoring and control systems / Caleb S. Coggins and Diane E. Levine -- Security audits, standards, and inspections / Donald Glass ... [and six others] -- Cyber investigation / Peter Stephenson.
Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data backups and archives / M.E. Kabay and Don Holden -- Business continuity planning / Michael Miora -- Disaster recovery / Michael Miora -- Insurance relief / Robert A. Parisi Jr., Chaim Haas, and Nancy Callahan -- Working with law enforcement / David A. Land.
Risk assessment and risk management / Robert V. Jacobson -- Management responsibilities and liabilities / Carl Hallberg ... [and three others] -- U.S. legal and regulatory security issues / Timothy Virtue -- Role of the CISO / Karen F. Worstell -- Developing security policies / M.E. Kabay and Sean Kelley -- Developing classification policies for data / Karthik Raman and Kevin Beets -- Outsourcing and security / Kip Boyle, Michael Buglewicz, and Steven Lovaas.
Privacy in cyberspace: U.S. and European perspectives / Marc Rotenberg -- Anonymity and identity in cyberspace / M.E. Kabay, Eric Salveggio, and Robert Guess -- Medical records protection / Paul J. Brusil -- Legal and policy issues of censorship and content filtering / Lee Tien, Seth Finkelstein, and Steven Lovaas -- Expert witnesses and the Daubert challenge / Chey Cobb -- Professional certification and training in information assurance / Christopher Christian ... [and three others] -- Undergraduate and graduate education in information assurance / Vic Maconachy, John Orlando, and Seymour Bosworth -- European graduate work in information assurance and the Bologna Declaration / Urs E. Gattiker -- Future of information assurance / Peter G. Neumann.
Summary The classic and authoritative reference in the field of computer security, now completely updated and revised. With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC).
Subject Electronic data processing departments -- Security measures.
Centres de traitement de l'information -- Sécurité -- Mesures.
Electronic data processing departments -- Security measures
Added Author Bosworth, Seymour.
Kabay, Michel E.
Whyne, Eric, 1981-
Other Form: Print version: Computer security handbook. 5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne. Hoboken, N.J. : John Wiley & Sons, ©2009 9780471716525 (DLC) 2008040626 (OCoLC)148798026
ISBN 9780470413746 (electronic bk.)
0470413743 (electronic bk.)
0471716529
9780471716525
9781119706724 (electronic bk.)
1119706726 (electronic bk.)
9781119706762 (electronic bk.)
1119706769 (electronic bk.)
9781119706748 (electronic bk.)
1119706742 (electronic bk.)
Standard No. 9780471716525
10.1002/9781119706762 doi
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information