Skip to main content

Computer and Information Security Handbook

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep cove… Read more

Early spring sale

Nurture your knowledge

Grow your expertise with up to 25% off trusted resources.

Description

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.

Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.

Online chapters can also be found on the book companion website:

https://www-elsevier-com.ucc.idm.oclc.org/books-and-journals/book-companion/9780128038437

Key features

  • Written by leaders in the field
  • Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices
  • Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Readership

Information Technology and Cyber Security practitioners and researchers in industry, government, the military, and law enforcement, as well as students and academics

Table of contents

Part I: Overview of System and Network Security: A Comprehensive Introduction
1. Information Security in the Modern Enterprise

2. Building a Secure Organization

3. A Cryptography Primer

4. Verifying User and Host Identity

5. Detecting System Intrusions

6. Intrusion Detection in Contemporary Environments

7. Preventing System Intrusions

8. Guarding Against Network Intrusions

9. Fault Tolerance and Resilience in Cloud Computing Environments

10. Securing Web Applications, Services and Servers

11. Unix and Linux Security

12. Eliminating the Security Weakness of Linux and Unix Operating Systems

13. Internet Security

14. The Botnet Problem

15. Intranet Security

16. Wireless Network Security

17. Wireless Sensor Network Security

18. Security for the Internet of Things

19. Cellular Network Security

20. RFID Security
Part II: Managing Information Security

21. Information Security Essentials for IT Managers, Protecting Mission-Critical Systems

22. Security Management Systems

23. Policy-Driven System Management

24. Social Engineering Deceptions and Defenses

25. Ethical Hacking

26. What Is Vulnerability Assessment?

27. Security Education, Training, and Awareness

28. Risk Management

29. Insider Threats
Part III: Disaster Recovery Security

30. Disaster Recovery

31. Disaster Recovery Plans for Small and Medium Business (SMB)
Part IV: Security Standards And Policies

32. Security Certification And Standards Implementation

33. Security Policies And Plans Development
Part V: Cyber, Network, and Systems Forensics Security and Assurance

34. Cyber Forensics

35. Cyber Forensics and Incident Response

36. Securing eDiscovery

37. Microsoft Office & Metadata Forensics: A Deeper Dive

38. Hard Drive Imaging
Part VI: Encryption Technology

39. Satellite Encryption

40. Public Key Infrastructure

41. Context-Aware Multi-Factor Authentication

42. Instant-Messaging Security
Part VII: Privacy and Access Management

43. Online Privacy

44. Privacy-enhancing Technologies

45. Detection Of Conflicts In Security Policies

46. Supporting User Privacy Preferences in Digital Interactions

47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions

48.
Virtual Private Networks

49. VoIP Security
Part VIII: Storage Security

50. Storage Area Networking Devices Security
Part IX: Cloud Security

51. Securing Cloud Computing Systems

52. Cloud Security

53. Private Cloud Security

54. Virtual Private Cloud Security
Part X: Virtual Security

55. Protecting Virtual Infrastructure

56. SDN and NFV Security
Part XI: Cyber Physical Security

57. Physical Security Essentials
Part XII: Practical Security

58. Online Identity and User Management Services

59. Intrusion Prevention and Detection Systems

60. Penetration Testing

61. Access Controls

62. Endpoint Security

63. Fundamentals of Cryptography
Part XIII: Critical Infrastructure Security

64. Securing the Infrastructure

65. Cyber Warfare
Part XIV: Advanced Security

66. Security Through Diversity

67. Online e-Reputation Management Services

68. Data Loss Protection

69. Satellite Cyber Attack Search and Destroy

70. Advanced Data Encryption
Part X: Appendices
Appendix A: Configuring Authentication Service On Microsoft Windows 10
Appendix B: Security Management and Resiliency
Appendix C: List of Top Information And Network Security Implementation and Deployment Companies
Appendix D: List of Security Products
Appendix E: List of Security Standards
Appendix F: List of Miscellaneous Security Resources
Appendix G: Ensuring Built-in Frequency Hopping Spread
Appendix H: Configuring Wireless Internet Security Remote Access
Appendix I: Frequently Asked Questions
Appendix J: Case Studies
Appendix K: Answers To Review Questions/Exercises, Hands-On Projects, Case Projects And Optional Team Case Project By Chapter


Review quotes

"The editor, John Vacca, has pulled together contributions from a large number of experts into a massive tome that touches on pretty much every angle of security and privacy. ...it’s hard to think of anyone with any interest in infosecurity who wouldn’t get something out of it.

This is the reference work you want on your bookshelf when you need to quickly get a grounding in some new aspect of security."—Network Security Newsletter

Product details

About the editor

JV

John Vacca

John Vacca is an independent information technology consultant and researcher, professional writer, editor, reviewer, and author based in Pomeroy, Ohio, USA. Since 1982, John has authored, edited, and published more than 85 books, including Smart Cities Policies and Financing: Approaches and Solutions, Elsevier; Cloud Computing Security: Foundations and Challenges, Taylor and Francis/CRC Press; Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation, Elsevier; Online Terrorist Propaganda, Recruitment, and Radicalization, Taylor and Francis/CRC Press; Nanoscale Networking and Communications Handbook, Taylor and Francis/CRC Press; Handbook of Sensor Networking: Advanced Technologies and Applications, Taylor and Francis/CRC Press; Network and System Security 2/e, Elsevier/Syngress; Cyber Security and IT Infrastructure Protection, Elsevier/Syngress; and Managing Information Security 2/e, Elsevier/Syngress; among many others. John was a Configuration Management Specialist, Computer Specialist, and the Computer Security Official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. John has also been a security consultant for major motion pictures, including AntiTrust, Collateral, and Identity Theft: The Michelle Brown Story. He received his M.Sc. from Kansas State University and an MBA from Emporia State University and served in the United States Air Force from 1967-1971.
Affiliations and expertise
Techwrite, Pomeroy, OH, USA

View book on ScienceDirect

Read Computer and Information Security Handbook on ScienceDirect