The Resource Computer and information security handbook, edited by John R. Vacca
Computer and information security handbook, edited by John R. Vacca
Resource Information
The item Computer and information security handbook, edited by John R. Vacca represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Computer and information security handbook, edited by John R. Vacca represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
- Language
- eng
- Edition
- Third edition.
- Extent
- 1 online resource
- Contents
-
- Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security
- Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and R̀̀easonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security
- Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE
- The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think Ò̀utside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems
- Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
- Isbn
- 9780128039298
- Label
- Computer and information security handbook
- Title
- Computer and information security handbook
- Statement of responsibility
- edited by John R. Vacca
- Subject
-
- Penetration testing (Computer security)
- Rechnernetz
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computersicherheit
- Datenschutz
- Datensicherung
- Electronic books
- Informationssystem
- Penetration testing (Computer security)
- Language
- eng
- Summary
- This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
- Assigning source
- Adapted from publisher's description
- Cataloging source
- EBLCP
- Dewey number
- 005.8
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- C627 2017
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- handbooks
- http://library.link/vocab/relatedWorkOrContributorName
- Vacca, John R.
- http://library.link/vocab/subjectName
-
- Computer networks
- Penetration testing (Computer security)
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer networks
- Penetration testing (Computer security)
- Rechnernetz
- Computersicherheit
- Datensicherung
- Informationssystem
- Datenschutz
- Label
- Computer and information security handbook, edited by John R. Vacca
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security
- Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and R̀̀easonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security
- Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE
- The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think Ò̀utside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems
- Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
- Control code
- 987775933
- Dimensions
- unknown
- Edition
- Third edition.
- Extent
- 1 online resource
- Form of item
- online
- Isbn
- 9780128039298
- Lccn
- 2016952601
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 9780128039298
- http://library.link/vocab/ext/overdrive/overdriveId
- 35bad32d-2af5-4fc1-804f-a5449b167f14
- Specific material designation
- remote
- System control number
- (OCoLC)987775933
- Label
- Computer and information security handbook, edited by John R. Vacca
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security
- Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and R̀̀easonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security
- Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE
- The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think Ò̀utside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems
- Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
- Control code
- 987775933
- Dimensions
- unknown
- Edition
- Third edition.
- Extent
- 1 online resource
- Form of item
- online
- Isbn
- 9780128039298
- Lccn
- 2016952601
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 9780128039298
- http://library.link/vocab/ext/overdrive/overdriveId
- 35bad32d-2af5-4fc1-804f-a5449b167f14
- Specific material designation
- remote
- System control number
- (OCoLC)987775933
Subject
- Penetration testing (Computer security)
- Rechnernetz
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computersicherheit
- Datenschutz
- Datensicherung
- Electronic books
- Informationssystem
- Penetration testing (Computer security)
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Computer-and-information-security-handbook/V0YoswnJ_ZM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Computer-and-information-security-handbook/V0YoswnJ_ZM/">Computer and information security handbook, edited by John R. Vacca</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Computer and information security handbook, edited by John R. Vacca
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Computer-and-information-security-handbook/V0YoswnJ_ZM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Computer-and-information-security-handbook/V0YoswnJ_ZM/">Computer and information security handbook, edited by John R. Vacca</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>