did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471716525

Computer Security Handbook, Set

by ; ;
  • ISBN13:

    9780471716525

  • ISBN10:

    0471716529

  • Edition: 5th
  • Format: Paperback
  • Copyright: 2009-02-09
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $231.95

Summary

The classic and authoritative reference in the field of computer security, now completely updated and revisedWith the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them.With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC).Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including:1. Hardware Elements of Security2. Fundamentals of Cryptography and Steganography3. Mathematical models of information security4. Insider threats5. Social engineering and low-tech attacks6. Spam, phishing, and Trojans: attacks meant to fool7. Biometric authentication8. VPNs and secure remote access9. Securing Peer2Peer, IM, SMS, and collaboration tools10. U.S. legal and regulatory security issues, such as GLBA and SOXWhether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.

Table of Contents

Foundations Of Computer Security
Brief History and Mission of Information System Security
History of Computer Crime
Toward a New Framework for Information Security
Hardware Elements of Security
Data Communications and Information Security
Network Topologies, Protocols, and Design
Encryption
Using a Common Language for Computer Security Incident Information
Mathematical Models of Computer Security
Understanding Studies and Surveys of Computer Crime
Fundamentals of Intellectual Property Law
Threats And Vulnerabilities
The Psychology of Computer Criminals
The Dangerous Information Technology Insider: Psychological Characteristics and Career Patterns
Information Warfare
Penetrating Computer Systems and Networks
Malicious Code
Mobile Code
Denial-of-Service Attacks
Social Engineering and Low-Tech Attacks
Spam, Phishing, and Trojans: Attacks Meant To Fool
Web-Based Vulnerabilities
Physical Threats to the Information Infrastructure
Prevention: Technical Defenses
Protecting the Information Infrastructure
Operating System Security
Local Area Networks
Gateway Security Devices
Intrusion Detection and Intrusion Prevention Devices
Identification and Authentication
Biometric Authentication
E-Commerce and Web Server Safeguards
Web Monitoring and Content Filtering
Virtual Private Networks and Secure Remote Access
802.11 Wireless LAN Security
Securing VOIP
Securing P2P, IM, SMS, and Collaboration Tools
Securing Stored Data
PKI and Certificate Authorities
Writing Secure Code
Software Development and Quality Assurance
Managing Software Patches and Vulnerabilities
Antivirus Technology
Protecting Digital Rights: Technical Approaches
Prevention: Human Factors
Ethical Decision Making and High Technology
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program