Mardigian Library
Ask a QuestionMy Library Account
Search Library Catalog - Books, DVDs & More
Limit to available
More Searches
   
Limit results to available items
Find more results:
Search MelCat
More Information
  
Computer and information security handbook / edited by John R. Vacca
Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, c2009
book jacket
Location Call Number Status
 4th Floor  QA76.9.A25 C652 2009    AVAILABLE
Subject(s) Computer networks -- Security measures
Computer security
Internet -- Security measures
Physical Description xxxii, 844 p. : ill. ; 29 cm
Note Includes bibliographical references and index
Contents Overview of system and network security : a comprehensive introduction / John Mallery -- A cryptography primer / Scott R. Ellis -- Preventing system intrusions / Michael West -- Guarding against network intrusions / Tom Chen and Patrick J. Walsh -- Unix and Linux security / Gerald Beuchelt -- Eliminating the security weakness of Linux and Unix operating systems / Mario Santana -- Internet security / Jesse Walker -- The botnet problem / Xinyuan Wang and Daniel Ramsbrock -- Intranet security / Bill Mansoor -- Local area network security / Pramod Pandya -- Wireless network security / Chunming Rong and Erdal Cayirci -- Cellular network security / Peng Liu, Thomas F. LaPorta and Kameswari Kotapati -- RFID security / Chunming Rong and Erdal Cayirci -- Information security essentials for IT managers, protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and Jim Harmening -- Information technology security management / Rahul Bhasker and Bhushan Kapoor -- Identity management / Jean-Marc Seigneur and Tewfiq El Malika -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan -- Firewalls / Errin W. Fulp -- Penetration testing / Sanjay Bavisi -- What is vulnerability assessment? / Almantas Kakareka -- Data encryption / Bhushan Kapoor and Pramod Pandya -- Satellite encryption / Daniel S. Soper -- Public key infrastructure / Terence Spies -- Instant-messaging security / Samuel J.J. Curry -- NET privacy / Marco Cremonini, Chiara Braghin and Claudio Agostino Ardagna -- Personal privacy policies / George Yee and Larry Korba -- Virtual private networks / Jim Harmening and Joe Wright -- Identity theft / Markus Jacobsson and Alex Tsow -- VoIP security / Dan Wing and Harsh Kupwade Patil -- SAN security / John McGowan, Jeffrey Bardin and John McDonald -- Storage area networking devices security / Robert Rounsavall -- Risk management / Sokratis K. Katsikas -- Physical security essentials / William Stallings -- Biometrics / Luther Martin -- Homeland security / Rahul Bhaskar and Bhushan Kapoor -- Information warfare / Jan Eloff and Anna Granova -- Security through diversity / Kevin Noble -- Reputation management / Jean-Marc Seigneur -- Content filtering / Peter Nicoletti -- Data loss protection / Ken Perkins -- Appendix A: Configuring authentication service on Microsoft Windows Vista / John R. Vacca -- Appendix B: Security management and resiliency / John R. Vacca -- Appendix C: List of top security implementation and deployment companies -- Appendix D: List of security products -- Appendix E: List of security standards -- Appendix F: List of miscellaneous security resources -- Appendix G: Ensuring built-in frequency hopping spread spectrum wireless network security -- Appendix H: Configuring wireless internet security remote access -- Appendix I: Frequently asked questions -- Appendix J: Glossary
Series Morgan Kaufmann series in computer security
Alternate Author Vacca, John R

Mardigian Library, 4901 Evergreen Rd.
Dearborn, MI 48128-1491 313-593-5400 fax 313-593-5561
ask-a-question@umd.umich.edu
The Regents of the University of Michigan | Non-Discrimination Policy
Copyright © The University of Michigan - Dearborn • 4901 Evergreen Road • Dearborn, Michigan 48128 • 313-593-5000
The University of Michigan - Ann Arbor | The University of Michigan - Flint | SITEMAP | DIRECTORY | CONTACT