Computer and Information Security Handbook book cover

Computer and Information Security Handbook

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.

Audience
The primary audience for this professional handbook consists of researchers and practitioners in industry and academia, as well as security technologists and engineers working with or interested in all aspects of computer security. This comprehensive reference will also be of value to students in upper-division undergraduate and grad level courses in computer security.

Hardbound, 928 Pages

Published: May 2009

Imprint: Morgan Kaufmann

ISBN: 978-0-12-374354-1

Reviews

  • "I believe that this book contains something for everyone no matter what your experience level or specialty in the information security field… I think John did a great job putting together this handbook and the team of experts to deliver this information and I would recommend this book for anyone in the information security field."--PenTestMag.com, March 2012, page 1

    "[T]here is a lot of information covering many topics contained within this book making it a valuable desk reference book or a textbook for a course in Information Security. I believe that this book contains something for everyone no matter what your experience level or specialty in the information security field… I think John did a great job putting together this handbook and the team of experts to deliver this information and I would recommend this book for anyone in the information security field."--PenTest Extra, June 2012, page 54


Contents

  • PART I OVERVIEW OF SYSTEM AND NETWORK SECURITY: A COMPREHENSIVE INTRODUCTIONCHAPTER 1 Building a Secure OrganizationCHAPTER 2 A Cryptography PrimerCHAPTER 3 Preventing System IntrusionsCHAPTER 4 Guarding Against Network IntrusionsCHAPTER 5 UNIX and Linux SecurityCHAPTER 6 Linux and UNIX SecurityCHAPTER 7 Internet SecurityCHAPTER 8 Internet Security: The Botnet Problem in Internet SecurityCHAPTER 9 Intranet SecurityCHAPTER 10 Local Area Network (LAN) SecurityCHAPTER 11 Wireless Network SecurityCHAPTER 12 Cellular Network SecurityCHAPTER 13 RFID SecurityPART II MANAGING INFORMATION SECURITYCHAPTER 14 Security Essentials for IT Managers: Protecting Mission-Critical SystemsCHAPTER 15 Security Management SystemsCHAPTER 16 IT Security ManagementCHAPTER 17 ID ManagementCHAPTER 18 Intrusion Detection and Prevention SystemsCHAPTER 19 Computer ForensicsCHAPTER 20 Network ForensicsCHAPTER 21 FirewallsCHAPTER 22 Penetration Testing CHAPTER 23 Vulnerability AssessmentPART III ENCRYPTION TECHNOLOGYCHAPTER 24 Data EncryptionCHAPTER 25 Satellite EncryptionCHAPTER 26 Public Key InfrastructureCHAPTER 27 Instant Messaging SecurityPART IV PRIVACY AND ACCESS MANAGEMENTCHAPTER 28 Net PrivacyCHAPTER 29 Personal Privacy PoliciesCHAPTER 30 Virtual Private NetworksCHAPTER 31 Identity TheftCHAPTER 32 VoIP SecurityPART V STORAGE SECURITYCHAPTER 33 SAN SecurityCHAPTER 34 Storage Area Network SecurityCHAPTER 35 Risk ManagementPART VI STORAGE SECURITYCHAPTER 36 Physical Security EssentialsCHAPTER 37 BiometericsCHAPTER 38 Homeland SecurityCHAPTER 39 Information WarfarePART VII ADVANCED SECURITYCHAPTER 40 Security Through DiversityCHAPTER 41 Online ReputationCHAPTER 42 Content FilteringCHAPTER 43 Data Loss Protection (DLP)PART VIII APPENDICESAPPENDIX A Configuring Authentication Service On Microsoft Windows VistaAPPENDIX B Security Management and ResiliencyAPPENDIX C List Of Top Security Implementation And Deployment CompaniesAPPENDIX D List Of Security ProductsAPPENDIX E List Of Security StandardsAPPENDIX F List Of Miscellaneous Security ResourcesAPPENDIX G Ensuring Built-in Frequency Hopping Spread Spectrum Wireless Network SecurityAPPENDIX H Configuring Wireless Internet Security Remote AccessAPPENDIX I Frequently Asked QuestionsAPPENDIX J Glossary

Advertisement

advert image