9780123743541-0123743540-Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

ISBN-13: 9780123743541
ISBN-10: 0123743540
Edition: 1
Author: John R. Vacca
Publication date: 2009
Publisher: Morgan Kaufmann
Format: Hardcover 928 pages
FREE US shipping
Buy

From $127.95

Book details

ISBN-13: 9780123743541
ISBN-10: 0123743540
Edition: 1
Author: John R. Vacca
Publication date: 2009
Publisher: Morgan Kaufmann
Format: Hardcover 928 pages

Summary

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security) (ISBN-13: 9780123743541 and ISBN-10: 0123743540), written by authors John R. Vacca, was published by Morgan Kaufmann in 2009. With an overall rating of 4.0 stars, it's a notable title among other books. You can easily purchase or rent Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security) (Hardcover) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.32.

Description

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book