This is the 2nd edition of the classic reference on system security but encompasses many new topics that have become relevant since the 1st edition. Editor Vacca, an information technology consultant and prolific author, presents a collection of 70 chapters and 12 appendices, written by many authors with backgrounds ranging from computer science to management. In this huge volume (1171 pages and online content) the numerous chapters cover almost every conceivable aspect of information and system security. Topics include encryption systems and cryptography, wireless security, Linux and Unix, cloud computing, physical security including biometrics, securing network storage, instant messaging, virtual private networks (VPN), forensics after intrusions, and much more. The appendices concern mainly information about specific software products, helpful resources, and companies specializing in security. It should be noted that 6 of the chapters and all the appendices and glossary are only available online. The last appendix the glossary. Annotation ©2013 Book News, Inc., Portland, OR (booknews.com)
Read More
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
Read Less