Computer and Information Security Handbook

Front Cover
John R. Vacca
Elsevier Science, May 22, 2009 - Computers - 928 pages
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.

Contents

Building a Secure Organization
5
xxix
25
Theory of Operation
37
Preventing System Intrusions
39
127
45
Guarding Against Network
53
Network Access Control
63
Unix and Linux Security
67
A Simple Mathematical Model
369
Daniel S Soper
453
Virtual Private Networks
507
Personal Privacy Policies
519
225
551
567
591
Security Management
605
Physical Security Essentials
629

Protecting User Accounts
71
Eliminating the Security Weakness of Linux and UNIX Operating Systems
79
Internet Security
93
The Botnet Problem
121
Intranet Security
133
Local Area Network Security
149
Local Area Network Security
151
A Comprehensive Introduction
186
RFID Security
209
RFID Challenges
255
Network Forensics
339
References
677
Data Loss Protection
745
Where to Begin?
753
Its a Family Affair Not Just
760
Appendix F List of Miscellaneous
785
Scripting the Addition of Access Points
795
Choosing the Correct Firewall
817
Security Considerations
837
Kerberos Enhancements
843
Copyright

Other editions - View all

About the author (2009)

John Vacca is an independent information technology consultant and researcher, professional writer, editor, reviewer, and author based in Pomeroy, Ohio, USA. Since 1982, John has authored, edited, and published more than 85 books, including Smart Cities Policies and Financing: Approaches and Solutions, Elsevier; Cloud Computing Security: Foundations and Challenges, Taylor and Francis/CRC Press; Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation, Elsevier; Online Terrorist Propaganda, Recruitment, and Radicalization, Taylor and Francis/CRC Press; Nanoscale Networking and Communications Handbook, Taylor and Francis/CRC Press; Handbook of Sensor Networking: Advanced Technologies and Applications, Taylor and Francis/CRC Press; Network and System Security 2/e, Elsevier/Syngress; Cyber Security and IT Infrastructure Protection, Elsevier/Syngress; and Managing Information Security 2/e, Elsevier/Syngress; among many others. John was a Configuration Management Specialist, Computer Specialist, and the Computer Security Official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. John has also been a security consultant for major motion pictures, including AntiTrust, Collateral, and Identity Theft: The Michelle Brown Story. He received his M.Sc. from Kansas State University and an MBA from Emporia State University and served in the United States Air Force from 1967-1971.

Bibliographic information