logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Computer Security Handbook

Computer Security Handbook (Paperback, 5th)

Seymour Bosworth, Eric Whyne, M. E. Kabay (엮은이)
John Wiley & Sons Inc
411,710원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
337,600원 -18% 0원
16,880원
320,720원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Computer Security Handbook
eBook 미리보기

책 정보

· 제목 : Computer Security Handbook (Paperback, 5th) 
· 분류 : 외국도서 > 경제경영 > 전략기획
· ISBN : 9780471716525
· 쪽수 : 2040쪽
· 출판일 : 2009-02-01

목차

Part I. Foundations Of Computer Security. 1. Brief History and Mission of Information System Security. 2. History of Computer Crime. 3. Toward a New Framework for Information Security. 4. Hardware Elements of Security. 5. Data Communications and Information Security. 6. Network Topologies, Protocols, and Design. 7. Encryption. 8. Using a Common Language for Computer Security Incident Information. 9. Mathematical Models of Computer Security. 10. Understanding Studies and Surveys of Computer Crime. 11. Fundamentals of Intellectual Property Law. Part II. Threats And Vulnerabilities. 12. The Psychology of Computer Criminals. 13. The Dangerous Information Technology Insider: Psychological Characteristics and Career Patterns. 14. Information Warfare. 15. Penetrating Computer Systems and Networks. 16. Malicious Code. 17. Mobile Code. 18. Denial-of-Service Attacks. 19. Social Engineering and Low-Tech Attacks. 20. Spam, Phishing, and Trojans: Attacks Meant To Fool. 21. Web-Based Vulnerabilities. 22. Physical Threats to the Information Infrastructure. Part III. Prevention: Technical Defenses. 23. Protecting the Information Infrastructure. 24. Operating System Security. 25. Local Area Networks. 26. Gateway Security Devices. 27. Intrusion Detection and Intrusion Prevention Devices. 28. Identification and Authentication. 29. Biometric Authentication. 30. E-Commerce and Web Server Safeguards. 31. Web Monitoring and Content Filtering. 32. Virtual Private Networks and Secure Remote Access. 33. 802.11 Wireless LAN Security. 34. Securing VOIP. 35. Securing P2P, IM, SMS, and Collaboration Tools. 36. Securing Stored Data. 37. PKI and Certificate Authorities. 38. Writing Secure Code. 39. Software Development and Quality Assurance. 40. Managing Software Patches and Vulnerabilities. 41. Antivirus Technology. 42. Protecting Digital Rights: Technical Approaches. Part IV. Prevention: Human Factors. 43. Ethical Decision Making and High Technology. 44. Security Policy Guidelines. 45. Employment Practices and Policies. 46. Vulnerability Assessment. 47. Operations Security and Production Controls. 48. E-Mail and Internet Use Policies. 49. Implementing a Security Awareness Program. 50. Using Social Psychology to Implement Security Policies. 51. Security Standards for Products. Part V. Detecting Security Breaches. 52. Application Controls. 53. Monitoring and Control Systems. 54. Security Audits, Standards and Inspections. 55. Cyber Investigation. Part VI. Response & Remediation. 56. Computer Security Incident Response Teams. 57. Data Backups and Archives. 58. Business Continuity Planning. 59. Disaster Recovery. 60. Insurance Relief. 61. Working with Law Enforcement. Part VII. Management's Role In Security. 62. Risk Assessment and Risk Management. 63. Management Responsibilities and Liabilities. 64. U.S. Legal and Regulatory Security Issues. 65. The Role of the CISO. 66. Developing Security Policies. 67. Developing Classification Policies for Data. 68. Outsourcing and Security. Part VIII. Public Policy And Other Considerations. 69. Privacy in Cyberspace: U.S. and European Perspectives.70. Anonymity and Identity in Cyberspace. 71. Medical Records Protection. 72. Legal and Policy Issues of Censorship and Content Filtering. 73. Expert Witnesses and the Daubert Challenge. 74. Professional Certification and Training in Information Assurance. 75. Undergraduate and Graduate Education in Information Assurance. 76. The Future of Information Assurance.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책