コンピュータ・情報セキュリティ・ハンドブック(第4版)<br>Computer and Information Security Handbook (2-Volume Set)(4)

個数:1
  • 電子書籍
  • ポイントキャンペーン

コンピュータ・情報セキュリティ・ハンドブック(第4版)
Computer and Information Security Handbook (2-Volume Set)(4)

  • 著者名:Vacca, John R. (EDT)
  • 価格 ¥44,173 (本体¥40,158)
  • Morgan Kaufmann(2024/08/28発売)
  • 冬の読書を楽しもう!Kinoppy 電子書籍・電子洋書 全点ポイント25倍キャンペーン(~1/25)
  • ポイント 10,025pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9780443132230
  • eISBN:9780443132247

ファイル: /

Description

Computer and Information Security Handbook, Fourth Edition offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, along with applications and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cyber Security for the Smart City and Smart Homes, Cyber Security of Connected and Automated Vehicles, and Future Cyber Security Trends and Directions, the book now has 104 chapters in 2 Volumes written by leading experts in their fields, as well as 8 updated appendices and an expanded glossary.Chapters new to this edition include such timely topics as Threat Landscape and Good Practices for Internet Infrastructure, Cyber Attacks Against the Grid Infrastructure, Threat Landscape and Good Practices for the Smart Grid Infrastructure, Energy Infrastructure Cyber Security, Smart Cities Cyber Security Concerns, Community Preparedness Action Groups for Smart City Cyber Security, Smart City Disaster Preparedness and Resilience, Cyber Security in Smart Homes, Threat Landscape and Good Practices for Smart Homes and Converged Media, Future Trends for Cyber Security for Smart Cities and Smart Homes, Cyber Attacks and Defenses on Intelligent Connected Vehicles, Cyber Security Issues in VANETs, Use of AI in Cyber Security, New Cyber Security Vulnerabilities and Trends Facing Aerospace and Defense Systems, and much more.- Written by leaders in the field- Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices- Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Table of Contents

Part 1: Overview of System and Network Security: A Comprehensive Introduction  1: Information Security in the Modern Enterprise, 2: Building a Secure Organization 3: A Cryptography Primer 4: Verifying User and Host Identity 5: Detecting System Intrusions 6: Intrusion Detection in Contemporary Environments 7: Preventing System Intrusions 8: Guarding Against Network Intrusions 9: Fault Tolerance and Resilience in Cloud Computing Environments 10: Securing Web Applications, Services and Servers 11: UNIX and Linux Security 12: Eliminating the Security Weakness of Linux and UNIX Operating Systems 13: Internet Security 14: The Botnet Problem 15: Intranet Security 16: Local Area Network Security 17: Wireless Network Security 18: Wireless Sensor Network Security: The Internet of Things 19: Security for the Internet of Things 20: Cellular Network Security 21: Radio Frequency Identification Security 22: Optical Network Security 23: Optical Wireless Security Part 2: Managing Information Security  24: Information Security Essentials for Information Technology Managers: Protecting Mission-Critical Systems 25: Security Management Systems 26: Policy-Driven System Management 27: Information Technology Security Management 28: The Enemy (The Intruder's Genesis) 29: Social Engineering Deceptions and Defenses 30: Ethical Hacking 31: What Is Vulnerability Assessment? 32: Security Metrics 33: Security Education, Training, and Awareness 34: Risk Management 35: Insider Threats Part 3: Disaster Recovery Security  36: Disaster Recovery 37: Disaster Recovery Plans for Small and Medium Business (SMB) Part 4: Security Standards And Policies  38: Security Certification And Standards Implementation 39: Security Policies And Plans Development Part 5: Cyber, Network, and Systems Forensics Security and Assurance  40: Cyber Forensics 41: Cyber Forensics And Incidence Response 42: Securing e-Discovery 43: Network Forensics 44: Microsoft Office and Metadata Forensics: A Deeper Dive 45: Hard Drive Imaging Part 6: Encryption Technology  46: Data Encryption 47: Satellite Encryption 48: Public Key Infrastructure 49: Password-based Authenticated Key Establishment Protocols 50: Context-Aware Multifactor Authentication Survey 51: Instant-Messaging Security Part 7: Privacy and Access Management  52: Online Privacy 53: Privacy-enhancing Technologies 54: Personal Privacy Policies 55: Detection Of Conflicts In Security Policies 56: Supporting User Privacy Preferences in Digital Interactions 57: Privacy and Security in Environmental Monitoring Systems: Issues and Solutions 58: Virtual Private Networks 59: Identity Theft 60: VoIP Security Part 8: Storage Security  61: SAN Security 62: Storage Area Networking Devices Security  Part 9: Cloud Security  63: Securing Cloud Computing Systems 64: Cloud Security 65: Private Cloud Security 66: Virtual Private Cloud Security Part 10: Virtual Security  67: Protecting Virtual Infrastructure 68: SDN and NFV Security Part 11: Cyber Physical Security  69: Physical Security Essentials 70.