The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large–scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy–seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). Of the seventy–seven chapters in the fifth edition, twenty–five chapters are completely new, including: 1. Hardware Elements of Security 2. Fundamentals of Cryptography and Steganography 3. Mathematical models of information security 4. Insider threats 5. Social engineering and low–tech attacks 6. Spam, phishing, and Trojans: attacks meant to fool 7. Biometric authentication 8. VPNs and secure remote access 9. Securing Peer2Peer, IM, SMS, and collaboration tools 10. U.S. legal and regulatory security issues, such as GLBA and SOX Whether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook , Fifth Edition equips you to protect the information and networks that are vital to your organization.
"synopsis" may belong to another edition of this title.
Computer professionals need to protect the information and networks that are vital to their organization. "The Computer Security Handbook" book and CD-ROM Set provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fifth Edition continues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions that can be taken to eliminate them. In this book, the collected chapters are written by renowned industry professionals. Professionals in computer security will benefit from this book.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 3.05. Seller Inventory # G0471716529I4N00
Quantity: 1 available
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEJUNE24-98890
Quantity: 5 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-61441
Quantity: 1 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 2040. Seller Inventory # 26435794
Quantity: 4 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 2040. Seller Inventory # 7412109
Quantity: 4 available
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: Like New. Like New. book. Seller Inventory # ERICA75804717165295
Quantity: 1 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 2040. Seller Inventory # 18435800
Quantity: 4 available
Seller: OM Books, Sevilla, SE, Spain
Condition: Usado - bueno. Seller Inventory # 9780471716525
Quantity: 1 available