Computer security handbook 5th


















Add to cart. Sold by betterworldbooks About this product Product Information The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously.

Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry profes-sionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium ISC.

Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including: Hardware Elements of Security Fundamentals of Cryptography and Steganography Mathematical models of information security Insider threats Social engineering and low-tech attacks Spam, phishing, and Trojans: attacks meant to fool Biometric authentication VPNs and secure remote access Securing Peer2Peer, IM, SMS, and collaboration tools U.

Computer Security Handbook , Fifth Edition equips you to protect the information and networks that are vital to your organization. Additional Product Features Number of Volumes. Show More Show Less. Pre-owned Pre-owned. No ratings or reviews yet No ratings or reviews yet. Be the first to write a review. Best Selling in Textbooks See all. Levy , Trade Paperback 5. You may also like. Trade Paperbacks.

This Handbook will be most valuable to those directly responsible for computer, network, or information security as well as those who must design, install, and maintain secure systems. It will be equally important to those managers whose operating functions can be affected by breaches in security and to those executives who are responsible for protecting the assets that have been entrusted to them.

With the advent of desktop, laptop, and handheld computers, and with the vast international networks that interconnect them, the nature and extent of threats to computer security have grown almost beyond measure.

In order to encompass this unprecedented expansion, the Computer Security Handbook has grown apace. When the first edition of the Handbook was published, its entire focus was on main-frame computers, the only type then in widespread use. The second edition recognized the advent of Skip to main content.



0コメント

  • 1000 / 1000