Computer and Information Security Handbook, 2nd Edition

  • Published By:
  • ISBN-10: 0123946123
  • ISBN-13: 9780123946126
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 1200 Pages | eBook
  • Original Copyright 2013 | Published/Released June 2014
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
About the Editor.
1: Overview of System and Network Security: A Comprehensive Introduction.
2: Building a Secure Organization.
3: A Cryptography Primer.
4: Detecting System Intrusions.
5: Preventing System Intrusions.
6: Guarding Against Network Intrusions.
7: Securing Cloud Computing Systems.
8: Fault Tolerance and Resilience in Cloud Computing Environments.
9: Securing Web Applications, Services, and Servers.
10: Unix and Linux Security.
11: Eliminating the Security Weakness of Linux and Unix Operating Systems.
12: Internet Security.
13: The Botnet Problem.
14: Intranet Security.
15: Local Area Network Security.
16: Wireless Network Security.
17: Wireless Sensor Network Security.
18: Cellular Network Security.
19: RFID Security.
20: Optical Network Security.
21: Optical Wireless Security.
22: Managing Information Security.
23: Information Security Essentials for IT Managers: Protecting Mission-Critical Systems.
24: Security Management Systems.
25: Policy-Driven System Management.
26: Information Technology Security Management.
27: Online Identity and User Management Services.
28: Intrusion Prevention and Detection Systems.
29: TCP/IP Packet Analysis.
30: The Enemy (The Intruder’s Genesis).
31: Firewalls.
32: Penetration Testing.
33: What is Vulnerability Assessment?.
34: Security Metrics: An Introduction and Literature Review.
35: Cyber, Network, and Systems Forensics Security and Assurance.
36: Cyber Forensics.
37: Cyber Forensics and Incident Response.
38: Securing E-Discovery.
39: Network Forensics.
40: Encryption Technology.
41: Data Encryption.
42: Satellite Encryption.
43: Public Key Infrastructure.
44: Password-Based Authenticated Key Establishment Protocols.
45: Instant-Messaging Security.
46: Privacy and Access Management.
47: Privacy on the Internet.
48: Privacy-Enhancing Technologies.
49: Personal Privacy Policies1.
50: Detection of Conflicts in Security Policies.
51: Supporting User Privacy Preferences in Digital Interactions.
52: Privacy and Security in Environmental Monitoring Systems: Issues and Solutions.
53: Virtual Private Networks.
54: Identity Theft.
55: VOIP Security.
56: Storage Security.
57: SAN Security.
58: Storage Area Networking Security Devices.
59: Risk Management.
60: Physical Security.
61: Physical Security Essentials.
62: Disaster Recovery.
63: Biometrics.
64: Homeland Security.
65: Cyber Warfare.
66: Practical Security.
67: System Security.
68: Securing the Infrastructure.
69: Access Controls.
70: Assessments and Audits.
71: Fundamentals of Cryptography.
72: Advanced Security.
73: Security Through Diversity.
74: Online E-Reputation Management Services.
75: Content Filtering.
76: Data Loss Protection.
77: Satellite Cyber Attack Search and Destroy.
78: Verifiable Voting Systems.
79: Advanced Data Encryption.