skip to content
Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management Preview this item
ClosePreview this item
Checking...

Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management

Author: Hossein Bidgoli
Publisher: Hoboken, N.J. : John Wiley, ©2006.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Handbook of information security.
Hoboken, N.J. : John Wiley, ©2006
(DLC) 2005006851
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Hossein Bidgoli
ISBN: 9780470051214 0470051213 1280409088 9781280409080
OCLC Number: 271872721
Description: 1 online resource.
Contents: Preface --
Guide to The Handbook of Information Security --
Internal Security Threats --
Physical Security Threats --
Fixed-Line Telephone System Vulnerabilities --
E-Mail Threats and Vulnerabilities --
E-Commerce Vulnerabilities --
Hacking Techniques in Wired Networks Hacking --
Hacking Techniques in Wireless Networks --
Computer Viruses and Worms --
Trojan Horse Programs --
Hoax Viruses and Virus Alerts --
Hostile Java Applets --
Spyware --
Mobile Code and Security --
Wireless Threats and Attacks --
WEP Security --
Bluetooth Security --
Cracking WEP --
Denial of Service Attacks --
Network Attacks --
Fault Attacks --
Side-Channel Attacks --
Physical Security Measures --
RFID and Security --
Cryptographic Privacy Protection Techniques --
Cryptographic Hardware Security Modules --
Smart Card Security --
Client-Side Security --
Server-Side Security --
Protecting Web Sites --
Database Security --
Medical Records Security --
Access Control: Principles and Solutions --
Password Authentication --
Computer and Network Authentication --
Antivirus Technology --
Biometric Basics and Biometric Authentication --
Issues and Concerns in Biometric IT Security --
Firewall Basics --
Firewall Architectures --
Packet Filtering and Stateful Firewalls --
Proxy Firewalls --
E-Commerce Safeguards --
Digital Signatures and Electronic Signatures --
E-Mail Security --
Security for ATM Networks --
VPN Basics --
VPN Architecture --
IP-Based VPN --
Identity Management --
The Use of Deception Techniques: Honeypots and Decoys --
Active Response to Computer Intrusions --
Intrusion Detection Systems Basics --
Host-Based Intrusion Detection Systems --
Network-Based Intrusion Detection Systems --
The Use of Agent Technology for Intrusion Detection --
Contingency Planning Management --
Computer Security Incident Response Teams (CSIRTs) --
Implementing a Security Awareness Program --
Risk Management for IT Security --
Security Insurance and Best Practices --
Auditing Information Systems Security --
Evidence Collection and Analysis Tools --
Information Leakage: Detection and Countermeasures --
Digital Rights Management --
Web Hosting --
Managing a Network Environment --
E-Mail and Internet Use Policies --
Forward Security Adaptive Cryptography: Time Evolution --
Security Policy Guidelines --
Asset- Security Goals Continuum: A Process for Security --
Multilevel Security --
Multilevel Security Models --
Security Architectures --
Quality of Security Service: Adaptive Security --
Security Policy Enforcement --
Guidelines for a Comprehensive Security System.
Other Titles: Threats, vulnerabilities, prevention, detection, and management
Responsibility: Hossein Bidgoli, editor-in-chief.

Abstract:

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/271872721> # Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
   library:oclcnum "271872721" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/2864672809#Place/hoboken_n_j> ; # Hoboken, N.J.
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
   schema:about <http://id.worldcat.org/fast/959166> ; # Home computer networks
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/> ;
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/2864672809#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/2864672809#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/2864672809#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:alternateName "Threats, vulnerabilities, prevention, detection, and management" ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/17437120> ; # Hossein Bidgoli
   schema:copyrightYear "2006" ;
   schema:datePublished "2006" ;
   schema:description "Preface -- Guide to The Handbook of Information Security -- Internal Security Threats -- Physical Security Threats -- Fixed-Line Telephone System Vulnerabilities -- E-Mail Threats and Vulnerabilities -- E-Commerce Vulnerabilities -- Hacking Techniques in Wired Networks Hacking -- Hacking Techniques in Wireless Networks -- Computer Viruses and Worms -- Trojan Horse Programs -- Hoax Viruses and Virus Alerts -- Hostile Java Applets -- Spyware -- Mobile Code and Security -- Wireless Threats and Attacks -- WEP Security -- Bluetooth Security -- Cracking WEP -- Denial of Service Attacks -- Network Attacks -- Fault Attacks -- Side-Channel Attacks -- Physical Security Measures -- RFID and Security -- Cryptographic Privacy Protection Techniques -- Cryptographic Hardware Security Modules -- Smart Card Security -- Client-Side Security -- Server-Side Security -- Protecting Web Sites -- Database Security -- Medical Records Security -- Access Control: Principles and Solutions -- Password Authentication -- Computer and Network Authentication -- Antivirus Technology -- Biometric Basics and Biometric Authentication -- Issues and Concerns in Biometric IT Security -- Firewall Basics -- Firewall Architectures -- Packet Filtering and Stateful Firewalls -- Proxy Firewalls -- E-Commerce Safeguards -- Digital Signatures and Electronic Signatures -- E-Mail Security -- Security for ATM Networks -- VPN Basics -- VPN Architecture -- IP-Based VPN -- Identity Management -- The Use of Deception Techniques: Honeypots and Decoys -- Active Response to Computer Intrusions -- Intrusion Detection Systems Basics -- Host-Based Intrusion Detection Systems -- Network-Based Intrusion Detection Systems -- The Use of Agent Technology for Intrusion Detection -- Contingency Planning Management -- Computer Security Incident Response Teams (CSIRTs) -- Implementing a Security Awareness Program -- Risk Management for IT Security -- Security Insurance and Best Practices -- Auditing Information Systems Security -- Evidence Collection and Analysis Tools -- Information Leakage: Detection and Countermeasures -- Digital Rights Management -- Web Hosting -- Managing a Network Environment -- E-Mail and Internet Use Policies -- Forward Security Adaptive Cryptography: Time Evolution -- Security Policy Guidelines -- Asset- Security Goals Continuum: A Process for Security -- Multilevel Security -- Multilevel Security Models -- Security Architectures -- Quality of Security Service: Adaptive Security -- Security Policy Enforcement -- Guidelines for a Comprehensive Security System."@en ;
   schema:description "The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/2864672809> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/2864672809#CreativeWork/handbook_of_information_security> ;
   schema:name "Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management"@en ;
   schema:productID "271872721" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/271872721#PublicationEvent/hoboken_n_j_john_wiley_2006> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/2864672809#Agent/john_wiley> ; # John Wiley
   schema:url <http://www.myilibrary.com?id=40908&ref=toc> ;
   schema:url <http://www.myilibrary.com?id=40908> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=151863> ;
   schema:url <http://www.ECU.eblib.com.au/EBLWeb/patron/?target=patron&extendedid=P_255367_0> ;
   schema:url <http://site.ebrary.com/id/10308071> ;
   schema:url <http://proquest.safaribooksonline.com/?fpi=9780471648321> ;
   schema:url <http://proquest.tech.safaribooksonline.de/9780471648321> ;
   schema:workExample <http://worldcat.org/isbn/9781280409080> ;
   schema:workExample <http://worldcat.org/isbn/9780470051214> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/271872721> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2864672809#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2864672809#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2864672809#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/959166> # Home computer networks
    a schema:Intangible ;
   schema:name "Home computer networks"@en ;
    .

<http://viaf.org/viaf/17437120> # Hossein Bidgoli
    a schema:Person ;
   schema:familyName "Bidgoli" ;
   schema:givenName "Hossein" ;
   schema:name "Hossein Bidgoli" ;
    .

<http://worldcat.org/entity/work/data/2864672809#CreativeWork/handbook_of_information_security>
    a schema:CreativeWork ;
   rdfs:label "Handbook of information security." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/271872721> ; # Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management
    .

<http://worldcat.org/isbn/9780470051214>
    a schema:ProductModel ;
   schema:isbn "0470051213" ;
   schema:isbn "9780470051214" ;
    .

<http://worldcat.org/isbn/9781280409080>
    a schema:ProductModel ;
   schema:isbn "1280409088" ;
   schema:isbn "9781280409080" ;
    .

<http://www.worldcat.org/title/-/oclc/271872721>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/271872721> ; # Handbook of information security. Volume 3, Threats, vulnerabilities, prevention, detection, and management
   schema:dateModified "2017-10-21" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.