
Computer and Information Security Handbook
Description
Key Features
- Written by leaders in the field
- Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices
- Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
Readership
Information Technology and Cyber Security practitioners and researchers in industry, government, the military, and law enforcement, as well as students and academics
Table of Contents
Part I: Overview of System and Network Security: A Comprehensive Introduction
1. Information Security in the Modern Enterprise
2. Building a Secure Organization
3. A Cryptography Primer
4. Verifying User and Host Identity
5. Detecting System Intrusions
6. Intrusion Detection in Contemporary Environments
7. Preventing System Intrusions
8. Guarding Against Network Intrusions
9. Fault Tolerance and Resilience in Cloud Computing Environments
10. Securing Web Applications, Services and Servers
11. Unix and Linux Security
12. Eliminating the Security Weakness of Linux and Unix Operating Systems
13. Internet Security
14. The Botnet Problem
15. Intranet Security
16. Wireless Network Security
17. Wireless Sensor Network Security
18. Security for the Internet of Things
19. Cellular Network Security
20. RFID Security
Part II: Managing Information Security
21. Information Security Essentials for IT Managers, Protecting Mission-Critical Systems
22. Security Management Systems
23. Policy-Driven System Management
24. Social Engineering Deceptions and Defenses
25. Ethical Hacking
26. What Is Vulnerability Assessment?
27. Security Education, Training, and Awareness
28. Risk Management
29. Insider Threats
Part III: Disaster Recovery Security
30. Disaster Recovery
31. Disaster Recovery Plans for Small and Medium Business (SMB)
Part IV: Security Standards And Policies
32. Security Certification And Standards Implementation
33. Security Policies And Plans Development
Part V: Cyber, Network, and Systems Forensics Security and Assurance
34. Cyber Forensics
35. Cyber Forensics and Incident Response
36. Securing eDiscovery
37. Microsoft Office & Metadata Forensics: A Deeper Dive
38. Hard Drive Imaging
Part VI: Encryption Technology
39. Satellite Encryption
40. Public Key Infrastructure
41. Context-Aware Multi-Factor Authentication
42. Instant-Messaging Security
Part VII: Privacy and Access Management
43. Online Privacy
44. Privacy-enhancing Technologies
45. Detection Of Conflicts In Security Policies
46. Supporting User Privacy Preferences in Digital Interactions
47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions
48. Virtual Private Networks
49. VoIP Security
Part VIII: Storage Security
50. Storage Area Networking Devices Security
Part IX: Cloud Security
51. Securing Cloud Computing Systems
52. Cloud Security
53. Private Cloud Security
54. Virtual Private Cloud Security
Part X: Virtual Security
55. Protecting Virtual Infrastructure
56. SDN and NFV Security
Part XI: Cyber Physical Security
57. Physical Security Essentials
Part XII: Practical Security
58. Online Identity and User Management Services
59. Intrusion Prevention and Detection Systems
60. Penetration Testing
61. Access Controls
62. Endpoint Security
63. Fundamentals of Cryptography
Part XIII: Critical Infrastructure Security
64. Securing the Infrastructure
65. Cyber Warfare
Part XIV: Advanced Security
66. Security Through Diversity
67. Online e-Reputation Management Services
68. Data Loss Protection
69. Satellite Cyber Attack Search and Destroy
70. Advanced Data Encryption
Part X: Appendices
Appendix A: Configuring Authentication Service On Microsoft Windows 10
Appendix B: Security Management and Resiliency
Appendix C: List of Top Information And Network Security Implementation and Deployment Companies
Appendix D: List of Security Products
Appendix E: List of Security Standards
Appendix F: List of Miscellaneous Security Resources
Appendix G: Ensuring Built-in Frequency Hopping Spread
Appendix H: Configuring Wireless Internet Security Remote Access
Appendix I: Frequently Asked Questions
Appendix J: Case Studies
Appendix K: Answers To Review Questions/Exercises, Hands-On Projects, Case Projects And Optional Team Case Project By Chapter
Product details
- No. of pages: 1280
- Language: English
- Copyright: © Morgan Kaufmann 2017
- Published: May 10, 2017
- Imprint: Morgan Kaufmann
- Hardcover ISBN: 9780128038437
- eBook ISBN: 9780128039298
About the Author
John Vacca

John Vacca is an information technology consultant, researcher, professional writer, editor, reviewer, and internationally-known best-selling author based in Pomeroy, Ohio. Since 1982, John has authored/edited 85 books (some of his most recent books include):
-
•Smart Cities Policies and Financing: Approaches and Solutions, 1st Edition (Publisher: Elsevier Inc.) (January 24, 2022)
•Cloud Computing Security: Foundations and Challenges, 2nd Edition (Publisher: CRC Press (an imprint of Taylor & Francis Group, LLC) (November 2, 2020))
•Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation, 1st Edition (Publisher: Elsevier Inc.) (September 30, 2020))
•Online Terrorist Propaganda, Recruitment, and Radicalization, 1st Edition (Publisher: CRC Press (an imprint of Taylor & Francis Group, LLC) (August 9, 2019))
•Nanoscale Networking and Communications Handbook, 1st Edition (Publisher: CRC Press (an imprint of Taylor & Francis Group, LLC) (July 22, 2019))
•Computer and Information Security Handbook, 3E (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 10, 2017))
•Security in the Private Cloud (Publisher: CRC Press (an imprint of Taylor & Francis Group, LLC) (September 1, 2016))
•Cloud Computing Security: Foundations and Challenges (Publisher: CRC Press (an imprint of Taylor & Francis Group, LLC) (August 19, 2016))
•Handbook of Sensor Networking: Advanced Technologies and Applications (Publisher: CRC Press (an imprint of Taylor & Francis Group, LLC) (January 14, 2015))
•Network and System Security, Second Edition, 2E (Publisher: Syngress (an imprint of Elsevier Inc.) (September 23, 2013))
•Cyber Security and IT Infrastructure Protection (Publisher: Syngress (an imprint of Elsevier Inc.) (September 23, 2013))
•Managing Information Security, Second Edition, 2E (Publisher: Syngress (an imprint of Elsevier Inc.) (September 23, 2013))
•Computer and Information Security Handbook, 2E (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (May 31, 2013))
•Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012 )
He has written more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request).
John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995.
In addition, John is also an independent online book reviewer. Finally, John was one of the security consultants for the MGM movie titled: "AntiTrust," which was released on January 12, 2001. A detailed copy of John's author bio can be viewed at URL: http://www.johnvacca.com. John can be reached at: john2164@windstream.net.
Affiliations and Expertise
Ratings and Reviews
Latest reviews
(Total rating for all reviews)
ConstantinosPapadopoulos Wed Jul 04 2018
Handbook o Computer and Information Security
Excellent book. My congratulations.