Menu Expand
Computer and Information Security Handbook

Computer and Information Security Handbook

John R. Vacca | John R. Vacca

(2009)

Additional Information

Book Details

Abstract

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.
* Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise
* Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
R1: Tom Karygiannis/Senior Research Scientist, NIST
"The author has assembled an excellent team of chapter authors. Each chapter is devoted to a particular topic. It seems that each chapter would serve as a good primer for the topic, but someone interested in that specific topic would have to buy books dedicated to that specific topic to round out their knowledge on the subject.... The best and possibly the widest audience is professionals that are not computer security experts and are looking for a primer on various computer security topics....[Author is] very well known, and one of the major strengths of the proposal."
R2-- David Harley, Independent Security Author (Syngress, etc.) and Consultant/UK:
"Its main strengths are the authoring experience of its editor, and the fact that it calls upon a wide range of authors to address a wide range of topics that might well appeal to those in need of a comprehensive but fairly general resource. Its weaknesses are that the proposal has a few gaps in coverage addressed above."