9780128038437-0128038438-Computer and Information Security Handbook

Computer and Information Security Handbook

ISBN-13: 9780128038437
ISBN-10: 0128038438
Edition: 3
Author: John R. Vacca
Publication date: 2017
Publisher: Morgan Kaufmann
Format: Hardcover 1280 pages
FREE US shipping
Rent
35 days
from $16.03 USD
FREE shipping on RENTAL RETURNS
Buy

From $22.97

Rent

From $16.03

Book details

ISBN-13: 9780128038437
ISBN-10: 0128038438
Edition: 3
Author: John R. Vacca
Publication date: 2017
Publisher: Morgan Kaufmann
Format: Hardcover 1280 pages

Summary

Computer and Information Security Handbook (ISBN-13: 9780128038437 and ISBN-10: 0128038438), written by authors John R. Vacca, was published by Morgan Kaufmann in 2017. With an overall rating of 3.6 stars, it's a notable title among other Network Security (Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Computer and Information Security Handbook (Hardcover, Used) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $3.49.

Description

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.

Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.

Online chapters can also be found on the book companion website:

https://www.elsevier.com/books-and-journals/book-companion/9780128038437

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book