Computer and Information Security Handbook 3rd Edition John R. Vacca (Editor) – Ebook Instant Download/Delivery ISBN(s): 9780128038437,0128038438
Product details:
- ISBN-10 : 0128038438
- ISBN-13 : 978-0128038437
- Author: Vacca
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.
With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.
Table of contents:
1. Introduction
2. Reporting
3. The “It Will Not Happen to Us” Factor
4. Why Vulnerability Assessment?
5. Penetration Testing Versus Vulnerability Assessment
6. Vulnerability Assessment Goal
7. Mapping the Network
8. Selecting the Right Scanners
9. Central Scans Versus Local Scans
10. Defense in Depth Strategy
11. Vulnerability Assessment Tools
12. Security Auditor’s Research Assistant
13. Security Administrator’s Integrated Network Tool
14. Microsoft Baseline Security Analyzer
15. Scanner Performance
16. Scan Verification
17. Scanning Cornerstones
18. Network Scanning Countermeasures
19. Vulnerability Disclosure Date
20. Proactive Security Versus Reactive Security
21. Vulnerability Causes
22. Do It Yourself Vulnerability Assessment
23. Summary
People also search:
computer and information systems managers
computer and information science
computer and information research scientists
computer and information technology
computer and information systems managers jobs