語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer and information security ha...
~
Vacca, John R.,
FindBook
Google Book
Amazon
博客來
Computer and information security handbook
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Computer and information security handbook/ edited by John R. Vacca.
其他作者:
Vacca, John R.,
出版者:
Cambridge, MA :Morgan Kaufmann Publishers, : 2017.,
面頁冊數:
1 online resource.
內容註:
Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security.
內容註:
Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security.
內容註:
Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE.
內容註:
The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems.
內容註:
Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
標題:
Computer networks - Security measures. -
電子資源:
https://www.sciencedirect.com/science/book/9780128038437
ISBN:
9780128039298 (electronic bk.)
Computer and information security handbook
Computer and information security handbook
[electronic resource] /edited by John R. Vacca. - Third edition. - Cambridge, MA :Morgan Kaufmann Publishers,2017. - 1 online resource.
Includes bibliographical references and index.
Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security.
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
ISBN: 9780128039298 (electronic bk.)
LCCN: 2016952601Subjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / C627 2017
Dewey Class. No.: 005.8
Computer and information security handbook
LDR
:04285cmm a2200337 a 4500
001
2246129
006
m o d
007
cr |n|||||||||
008
211223s2017 maua gobf 001 0 eng d
010
$a
2016952601
020
$a
9780128039298 (electronic bk.)
020
$a
0128039299 (electronic bk.)
020
$a
9780128038437
020
$a
0128038438
035
$a
(OCoLC)987775933
035
$a
ocn987775933
040
$a
EBLCP
$b
eng
$c
EBLCP
$d
YDX
$d
N$T
$d
ESU
$d
UIU
$d
N$T
$d
OPELS
$d
TEFOD
$d
UMI
$d
OCLCF
$d
MERER
$d
OCLCQ
$d
VT2
$d
OCLCO
$d
LND
$d
D6H
$d
OCLCQ
$d
UAB
$d
U3W
$d
OCLCQ
$d
CEF
$d
KSU
$d
OCLCQ
$d
OCLCA
$d
WYU
$d
OCLCQ
$d
OTZ
$d
OCLCQ
$d
OCLCA
$d
OCLCQ
$d
S2H
$d
OCLCO
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C627 2017
082
0 4
$a
005.8
$2
23
245
0 0
$a
Computer and information security handbook
$h
[electronic resource] /
$c
edited by John R. Vacca.
250
$a
Third edition.
260
$a
Cambridge, MA :
$b
Morgan Kaufmann Publishers,
$c
2017.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security.
505
8
$a
Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security.
505
8
$a
Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE.
505
8
$a
The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems.
505
8
$a
Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
520
$a
This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
$c
Adapted from publisher's description.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Penetration testing (Computer security)
$3
1639612
650
7
$a
COMPUTERS
$x
Internet
$x
Security.
$2
bisacsh
$3
1375395
650
7
$a
COMPUTERS
$x
Networking
$x
Security.
$2
bisacsh
$3
1375396
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
1375397
650
7
$a
Rechnernetz
$2
gnd
$3
3509182
650
7
$a
Computersicherheit
$2
gnd
$3
3509183
650
7
$a
Datensicherung
$2
gnd
$3
3509184
650
7
$a
Informationssystem
$2
gnd
$3
3509185
650
7
$a
Datenschutz
$2
gnd
$3
3509186
655
0
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Vacca, John R.,
$e
editor.
$3
3509181
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128038437
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9406624
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C627 2017
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入