Computer and Information Security Handbook (Hardcover)
John R. Vacca
- 出版商: Morgan Kaufmann
- 出版日期: 2009-05-01
- 定價: $2,800
- 售價: 5.0 折 $1,400
- 語言: 英文
- 頁數: 928
- 裝訂: Hardcover
- ISBN: 0123743540
- ISBN-13: 9780123743541
-
相關分類:
資訊安全
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$2,460$2,337 -
$2,831The Design of the UNIX Operating System (Paperback)
-
$2,520$2,394 -
$480$379 -
$1,330Introduction to Modern Cryptography: Principles and Protocols (Hardcover)
-
$690$587 -
$580$493 -
$1,560$1,482 -
$580$458 -
$580$458 -
$940$700 -
$780$616 -
$680$537 -
$590$466 -
$580$458 -
$420$378 -
$800$720 -
$2,880$2,736 -
$580$493 -
$1,663,260$1,575,720 -
$680$537 -
$980$774 -
$2,450$2,328 -
$2,980$2,831 -
$780$616
相關主題
商品描述
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures.
In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems.
From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients.
Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications.
This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security.
- Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise.
- This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.
- Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
商品描述(中文翻譯)
本書介紹了如何分析網絡風險以及選擇和部署適當的對策,以減少您面臨的物理和網絡威脅。它還傳授了識別和對抗一些基本安全風險和要求的技能和知識,包括互聯網安全威脅和措施(審計軌跡IP嗅探/欺騙等),以及如何實施安全政策和程序。
此外,本書還涵蓋了與特定漏洞和威脅相關的安全和網絡設計。它還包括風險評估和緩解以及安全系統的審計和測試。
從本書中,讀者還將學習應用構建安全VPN所需的標準和技術,配置客戶端軟件和服務器操作系統,支持IPsec的路由器,防火牆和SSL客戶端。
本書的章節內容包括識別漏洞並實施適當的對策,以防止和減輕對關鍵任務的威脅。探討了創建業務連續性計劃(BCP)的技術,以及構建支持其有效實施的基礎設施的方法論。
公鑰基礎設施(PKI)是確保企業機密性、完整性和身份驗證日益關鍵的組成部分。本書將提供選擇、設計和部署PKI以保護現有和未來應用程序所需的基本知識和技能。
本書還將討論漏洞掃描器以檢測安全弱點和預防技術,同時保持系統安全的關鍵服務的訪問。
本書的章節由該領域的專家貢獻,涵蓋了計算機安全技術的理論和實踐,使讀者能夠提高技術專業水平。
本書全面且最新的安全問題涵蓋範圍有助於學習,使讀者能夠從多個角度保持時刻更新和充分了解。
本書提供了分析和解決問題技巧,增強讀者對材料的理解和實施實際解決方案的能力。