Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Computer and information security ha...
~
Vacca, John R.,
Computer and information security handbook
Record Type:
Electronic resources : Monograph/item
Title/Author:
Computer and information security handbookedited by John R. Vacca.
other author:
Vacca, John R.,
Published:
Cambridge, MA :Morgan Kaufmann Publishers,2017.
Description:
1 online resource.
Subject:
Computer networksSecurity measures.
Online resource:
https://www.sciencedirect.com/science/book/9780128038437
ISBN:
9780128039298 (electronic bk.)
Computer and information security handbook
Computer and information security handbook
[electronic resource] /edited by John R. Vacca. - Third edition. - Cambridge, MA :Morgan Kaufmann Publishers,2017. - 1 online resource.
Includes bibliographical references and index.
Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security.
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
ISBN: 9780128039298 (electronic bk.)
LCCN: 2016952601Subjects--Topical Terms:
185597
Computer networks
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / C627 2017
Dewey Class. No.: 005.8
Computer and information security handbook
LDR
:04281cmm a2200337 a 4500
001
601522
006
m o d
007
cr |n|||||||||
008
211110s2017 maua gobf 001 0 eng d
010
$a
2016952601
020
$a
9780128039298 (electronic bk.)
020
$a
0128039299 (electronic bk.)
020
$a
9780128038437
020
$a
0128038438
035
$a
(OCoLC)987775933
035
$a
ocn987775933
040
$a
EBLCP
$b
eng
$c
EBLCP
$d
YDX
$d
N
$d
ESU
$d
UIU
$d
N
$d
OPELS
$d
TEFOD
$d
UMI
$d
OCLCF
$d
MERER
$d
OCLCQ
$d
VT2
$d
OCLCO
$d
LND
$d
D6H
$d
OCLCQ
$d
UAB
$d
U3W
$d
OCLCQ
$d
CEF
$d
KSU
$d
OCLCQ
$d
OCLCA
$d
WYU
$d
OCLCQ
$d
OTZ
$d
OCLCQ
$d
OCLCA
$d
OCLCQ
$d
S2H
$d
OCLCO
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C627 2017
082
0 4
$a
005.8
$2
23
245
0 0
$a
Computer and information security handbook
$h
[electronic resource] /
$c
edited by John R. Vacca.
250
$a
Third edition.
260
$a
Cambridge, MA :
$b
Morgan Kaufmann Publishers,
$c
2017.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security.
505
8
$a
Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security.
505
8
$a
Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE.
505
8
$a
The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems.
505
8
$a
Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
520
$a
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
$c
Adapted from publisher's description.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Penetration testing (Computer security)
$3
647045
650
7
$a
COMPUTERS
$x
Internet
$x
Security.
$2
bisacsh
$3
536865
650
7
$a
COMPUTERS
$x
Networking
$x
Security.
$2
bisacsh
$3
536866
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
536867
650
7
$a
Rechnernetz
$2
gnd
$3
896683
650
7
$a
Computersicherheit
$2
gnd
$3
896684
650
7
$a
Datensicherung
$2
gnd
$3
896685
650
7
$a
Informationssystem
$2
gnd
$3
896686
650
7
$a
Datenschutz
$2
gnd
$3
896687
655
0
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Vacca, John R.,
$e
editor.
$3
896682
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128038437
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000200778
電子館藏
1圖書
電子書
EB QA76.9.A25 C627 2017 2017
一般使用(Normal)
in cat dept.
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9780128038437
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login