Computer And Information Security Handbook
Main Author: | Vacca, John R. |
---|---|
Format: | Book |
Terbitan: |
Morgan Kaufmann
, 2013
|
Subjects: | |
Online Access: |
http://library.universitaspertamina.ac.id:80/index.php?p=show_detail&id=1737 http://library.universitaspertamina.ac.id:80/images/docs/Computer_And_Information_Security_Handbook.jpg.jpg |
ctrlnum |
ai:slims-1737 |
---|---|
fullrecord |
<?xml version="1.0"?>
<dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title>Computer And Information Security Handbook</title><creator>Vacca, John R.</creator><publisher>Morgan Kaufmann</publisher><date>2013</date><hasVersion>Ed. 2nd</hasVersion><language>English</language><medium>Text</medium><type>Book:Book</type><extent>xxviii, 1171 p. : Illust. ; 29 cm</extent><description>The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions.</description><abstract>The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions.</abstract><subject>Penetration Testing (Computer Security)</subject><subject>Computer Networks--Security Measures</subject><subject>005.8</subject><identifier>http://library.universitaspertamina.ac.id:80/index.php?p=show_detail&id=1737</identifier><identifier>9780123943972</identifier><identifier>R 005.8 VAC c</identifier><hasPart>3656/PUP/2017</hasPart><relation>http://library.universitaspertamina.ac.id:80/images/docs/Computer_And_Information_Security_Handbook.jpg.jpg</relation><recordID>ai:slims-1737</recordID></dc>
|
format |
Book:Book Book |
author |
Vacca, John R. |
title |
Computer And Information Security Handbook |
publisher |
Morgan Kaufmann |
publishDate |
2013 |
isbn |
9780123943972 |
topic |
Penetration Testing (Computer Security) Computer Networks--Security Measures 005.8 |
url |
http://library.universitaspertamina.ac.id:80/index.php?p=show_detail&id=1737 http://library.universitaspertamina.ac.id:80/images/docs/Computer_And_Information_Security_Handbook.jpg.jpg |
contents |
The second edition of this comprehensive handbook of computer and information security serves as a professional reference and practitioner's guide providing the most complete view computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into ten parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security; information management; cyber warfare and security; encryption technology; privacy; data storage; physical security; and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise. Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints. Analysis and problem-solving techniques enhance the reader's grasp of the material and ability to implement practical solutions. |
id |
IOS20790.ai:slims-1737 |
institution |
Universitas Pertamina |
institution_id |
3244 |
institution_type |
library:university library |
library |
Perpustakaan Universitas Pertamina |
library_id |
2524 |
collection |
Katalog Online Perpustakaan Universitas Pertamina |
repository_id |
20790 |
city |
JAKARTA SELATAN |
province |
DKI JAKARTA |
repoId |
IOS20790 |
first_indexed |
2024-12-31T01:00:38Z |
last_indexed |
2024-12-31T01:00:38Z |
recordtype |
dc |
merged_child_boolean |
1 |
_version_ |
1832578282561732609 |
score |
9.9049015 |