Computer security handbook

The classic and authoritative reference in the field of computer security, now completely updated and revised. With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature an...

Full description

Bibliographic Details
Main Author: Bosworth, Seymour
Other Authors: Kabay, Michel E., Whyne, Eric
Format: eBook
Language:English
Published: Hoboken, N.J. John Wiley & Sons 2009
Edition:5th ed. / edited by Seymour Bosworth, M.E. Kabay, Eric Whyne
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Ethical decision making and high technology / James Landon Linderman
  • Security policy guidelines / M.E. Kabay and Bridgitt Robertson
  • Employment practices and policies / M.E. Kabay and Bridgitt Robertson
  • Vulnerability assessment / Rebecca Gurley Bace
  • Operations security and production controls / M.E. Kabay, Don Holden, and Myles Walsh
  • E-mail and Internet use policies / M.E. Kabay and Nicholas Takacs
  • Implementing a security awareness program / K. Rudolph
  • Using social psychology to implement security policies / M.E. Kabay ... [and three others]
  • Security standards for products / Paul J. Brusil and Noel Zakin
  • Protecting the information infrastructure / Franklin Platt
  • Operating system security / William Stallings
  • Local area networks / Gary C. Kessler and N. Todd Pritsky
  • Gateway security devices / David Brussin and Justin Opatrny
  • Intrusion detection and intrusion prevention devices / Rebecca Gurley Bace
  • Identification and authentication / Ravi Sandhu ... [and three others]
  • Biometric authentication / David R. Lease ... [and three others]
  • E-commerce and Web server safeguards / Robert Gezelter
  • Web monitoring and content filtering / Steven Lovaas
  • Virtual private networks and secure remote access / Justin Opatrny
  • 802.11 wireless LAN security / Gary L. Tagg
  • Securing VoIP / Christopher Dantos and John Mason
  • Securing P2P, IM, SMS, and collaboration tools / Carl Ness
  • Securing stored data / David J. Johnson, Nicholas Takacs, and Jennifer Hadley
  • PKI and certificate authorities / Santosh Chokhani, Padgett Peterson, and Steven Lovaas
  • Writing secure code / Lester E. Nichols, M.E. Kabay, and Timothy Braithwaite
  • Software development and quality assurance / John Mason, Jennifer Hadley, and Diane E. Levine
  • Managing software patches and vulnerabilities / Peter Mell and Karen Kent
  • Antivirus technology / Chey Cobb and Allysa Myers
  • Protecting digital rights: technical approaches / Robert Guess ... [and three others]
  • Includes bibliographical references and index
  • Psychology of computer criminals / Q. Campbell and David M. Kennedy
  • Dangerous information technology insider: psychological characteristics and career patterns / Jerrold M. Post
  • Information warfare / Seymour Bosworth
  • Penetrating computer systems and networks / Chey Cobb, Stephen Cobb, and M.E. Kabay
  • Malicious code / Robert Guess and Eric Salveggio
  • Mobile code / Robert Gezelter
  • Denial-of-service attacks / Gary C. Kessler and Diane E. Levine
  • Social engineering and low-tech attacks / Karthik Raman ... [and three others]
  • Spam, phishing, and Trojans: attacks meant to fool / Stephen Cobb
  • Web-based vulnerabilities / Anup K. Ghosh ... [and three others]
  • Physical threats to the information infrastructure / Franklin Platt
  • Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens
  • Data backups and archives / M.E. Kabay and Don Holden
  • Business continuity planning / Michael Miora
  • Disaster recovery / Michael Miora
  • Insurance relief / Robert A. Parisi Jr., Chaim Haas, and Nancy Callahan
  • Working with law enforcement / David A. Land
  • Privacy in cyberspace: U.S. and European perspectives / Marc Rotenberg
  • Anonymity and identity in cyberspace / M.E. Kabay, Eric Salveggio, and Robert Guess
  • Medical records protection / Paul J. Brusil
  • Legal and policy issues of censorship and content filtering / Lee Tien, Seth Finkelstein, and Steven Lovaas
  • Expert witnesses and the Daubert challenge / Chey Cobb
  • Professional certification and training in information assurance / Christopher Christian ... [and three others]
  • Undergraduate and graduate education in information assurance / Vic Maconachy, John Orlando, and Seymour Bosworth
  • European graduate work in information assurance and the Bologna Declaration / Urs E. Gattiker
  • Future of information assurance / Peter G. Neumann
  • Application controls / Myles Walsh
  • Monitoring and control systems / Caleb S. Coggins and Diane E. Levine
  • Security audits, standards, and inspections / Donald Glass ... [and six others]
  • Cyber investigation / Peter Stephenson
  • Risk assessment and risk management / Robert V. Jacobson
  • Management responsibilities and liabilities / Carl Hallberg ... [and three others]
  • U.S. legal and regulatory security issues / Timothy Virtue
  • Role of the CISO / Karen F. Worstell
  • Developing security policies / M.E. Kabay and Sean Kelley
  • Developing classification policies for data / Karthik Raman and Kevin Beets
  • Outsourcing and security / Kip Boyle, Michael Buglewicz, and Steven Lovaas
  • Brief history and mission of information system security / Seymour Bosworth and Robert V. Jacobson
  • History of computer crime / M.E. Kabay
  • Toward a new framework for information security / Donn B. Parker
  • Hardware elements of security / Seymour Bosworth and Stephen Cobb
  • Data communications and information security / Raymond Panko
  • Network topologies, protocols, and design / Gary C. Kessler and N. Todd Pritsky
  • Encryption / Stephen Cobb and Corinne Lefrancois
  • Using a common language for computer security incident information / John D. Howard
  • Mathematical models of computer security / Matt Bishop
  • Understanding studies and surveys of computer crime / M.E. Kabay
  • Fundamentals of intellectual property law / William A. Zucker and Scott J. Nathan