Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering Forlænget returret til 31/01/25

Computer and Information Security Handbook

Forfatter: info mangler
  • Format
  • Bog, hardback
  • Engelsk

Beskrivelse

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437

Læs hele beskrivelsen
Detaljer
Størrelse og vægt
  • Vægt2740 g
  • coffee cup img
    10 cm
    book img
    21,6 cm
    27,6 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Design Cyberspace Access Customer relationship management DOS Browser Espionage Cryptography Encryption Attack Evidence Business Document Defense Creativity Delivery Development Computer viruses Elasticity Accounting Access control Algorithms Crackers Awareness Continuity Detection Errors Auditing Acquisitions Control Authentication Confidentiality Angular momentum Application Assurance Blogs Digital signatures Cloud computing Distributed computing Diversity Data Enterprise resource planning Assessment antivirus Denial of service attacks conflicts cyber Data encryption Distributed systems ASSET Connectivity COBIT Cyberattacks Cryptographic Cybercrime Advanced Persistent Threat Digital Society Botnet E-services Disaster recovery Digital identity Business Continuity Anonymization Cryptographic protocols Bot Cybersecurity Attack vectors Biometric Systems Availability Authenticity Cipher Cyber-attack Attacks Cloud Security Device Biometric Security Complete Computer forensics Data recovery Daemons Downlink Defense in Depth Container Assessments Data Leakage Digital Signature Audits Console Exploit Cyber-attacks Enterprise Risk Management Application security Cloud Biometric Data Communication security Capacity Discrete logarithm Data security Cellular networks Decryption Believable Data link layer Data storage Authorization Directives Business impact assessment Data capture Controls Cyber forensics Data privacy DDoS Cyber-warfare Authentic Centralized Systems Exploits Biometrics Data analytics Disaster Recovery Planning E-voting systems Business impact analysis Discretionary Access Control Access controls Acceptable use policies Abstract policies Active attack Access control standards and accountability Access and half-open scanning Account credentials admissible Anomaly-based IDS Algorithms and cryptographic standards Authentic payment notification Aviation Security Bandwidth and data rates Backbone networks Authentic promotion Authentication implicit authentication Authentication systems and authentication Backups Automated network defense Business Continuity Strategy Business litigation Attacker-controlled data Cellular network security Certificate-based public key infrastructures Block Ciphers Back-end database Asynchronously keyed encryption algorithms Computer-based cryptography Content-control software Content filtering Context establishment Cloud layers Business-critical activities Cipher Text Contradictory and redundant Content created Communicating and cybersecurity Central scans and local scans Commercial business Cybercriminal Data minimization Biometric system architecture Database reconstruction Data rate CIDR Context factors Denial-of-service (DoS) attacks and training Core Network Client-to-server Cross-network services documentary evidence Command and control or C2Cyberattack Decrypted Data loss protection Data Subjects Confirm primitive Electronic product code tags and radio frequency identification applications Certifying Authorities Definition finite and infinite groups Cataloging assets Centralized identity management Directory Services Environmental monitoring systems environmental threats E-Reputation Ethical hacking Explicit authentication Executable policies Data content Date last saved Extrusion prevention system Electronic Discovery Reference Model Default accept policy Cognitive limitations Email based call forwarding service error control Closed nature Cloud access security broker Content monitoring End point encryption Credential Selection Data center security Data broker Definition group Decoy host Describable threats Degrees of certainty Design and management access Directory paths Enciphering and deciphering Endpoint Extraplanetary links
    Machine Name: SAXO081