Computer Security Handbook (eBook)
1224 Seiten
Wiley (Verlag)
978-0-471-26975-5 (ISBN)
SEYMOUR BOSWORTH, CDP , is president of S. Bosworth & Associates, Plainview, New York, a management consulting firm active in computing applications for banking, commerce, and industry. Since 1972 Bosworth has been a contributing editor to all four editions of the Computer Security Handbook, and he has written many articles and lectured extensively about computer security and other technical and managerial subjects. He has been responsible for design and manufacture, system analysis, programming, and operations of both digital and analog computers. M. E. KABAY, PhD, is Associate Professor of Computer Information Systems at Norwich University, where he is also director of the graduate program in Information Assurance. During his career, he has worked as an operating systems internals and database performance specialist for Hewlett-Packard, an operations manager at a large service bureau, and a consultant in operations, performance, and security.
PART ONE: FOUNDATIONS OF COMPUTER SECURITY.
Brief History and Mission of Information System Security (S. Bosworth & R. Jacobson).
Cyberspace Law and Computer Forensics (R. Heverly & M. Wright).
Using a "Common Language" for Computer Security Incident Information (J. Howard & P. Meunier).
Studies and Surveys of Computer Crime (M. Kabay).
Toward a New Framework for Information Security (D. Parker).
PART TWO: THREATS AND VULNERABILITIES.
The Psychology of Computer Criminals (Q. Campbell & D. Kennedy).
Information Warfare (S. Bosworth).
Penetrating Computer Systems and Networks (C. Cobb, et al.).
Malicious Code (R. Thompson).
Mobile Code (R. Gezelter).
Denial of Service Attacks (D. Levine & G. Kessler).
The Legal Framework for Protecting Intellectual Property in the Field of Computing and Computer Software (W. Zucker & S. Nathan).
E-Commerce Vulnerabilities (A. Ghosh).
Physical Threats to the Information Infrastructure (F. Platt).
PART THREE: PREVENTION: TECHNICAL DEFENSES.
Protecting the Information Infrastructure (F. Platt).
Identification and Authentication (R. Sandhu).
Operating System Security (W. Stallings).
Local Area Networks (G. Kessler & N. Pritsky).
E-Commerce Safeguards (J. Ritter & M. Money).
Firewalls and Proxy Servers (D. Brussin).
Protecting Internet-Visible Systems (R. Gezelter).
Protecting Web Sites (R. Gezelter).
Public Key Infrastructures and Certificate Authorities (S. Chokhani).
Antivirus Technology (C. Cobb).
Software Development and Quality Assurance (D. Levine).
Piracy and Antipiracy Techniques (D. Levine).
PART FOUR: PREVENTION: HUMAN FACTORS.
Standards for Security Products (P. Brusil & N. Zakin).
Security Policy Guidelines (M. Kabay).
Security Awareness (K. Rudolph, et al.).
Ethical Decision Making and High Technology (J. Linderman).
Employment Practices and Policies (M. Kabay).
Operations Security and Production Controls (M. Walsh & M. Kabay).
E-Mail and Internet Use Policies (M. Kabay).
Working with Law Enforcement (M. Wright).
Using Social Psychology to Implement Security Policies (M. Kabay).
Auditing Computer Security (D. Levine).
PART FIVE: DETECTION.
Vulnerability Assessment and Intrusion Detection Systems (R. Bace).
Monitoring and Control Systems (D. Levine).
Application Controls (M. Walsh).
PART SIX: REMEDIATION.
Computer Emergency Quick-Response Teams (B. Cowens & M. Miora).
Data Backups and Archives (M. Kabay).
Business Continuity Planning (M. Miora).
Disaster Recovery (M. Miora).
Insurance Relief (R. Parisi, Jr.).
PART SEVEN: MANAGEMENT'S ROLE.
Management Responsibilities and Liabilities (C. Hallberg, et al.).
Developing Security Policies (M. Kabay).
Risk Assessment and Risk Management (R. Jacobson).
Y2K: Lessons Learned for Computer Security (T. Braithwaite).
PART EIGHT: OTHER CONSIDERATIONS.
Medical Records Security (P. Brusil & D. Harley).
Using Encryption Internationally (D. Levine).
Censorship and Content Filtering (L. Tien & S. Finkelstein).
Privacy in Cyberspace (B. Hayes, et al.).
Anoymity and Identity in Cyberspace (M. Kabay).
The Future of Information Security (P. Tippett).
Index.
Erscheint lt. Verlag | 16.10.2002 |
---|---|
Sprache | englisch |
Themenwelt | Schulbuch / Wörterbuch ► Lexikon / Chroniken |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Schlagworte | Accounting • Accounting Technology • Auditing • Computer Science • Computersicherheit • Informatik • Informatik, EDV / Informatik • Networking / Security • Netzwerke / Sicherheit • Rechnungswesen • Rechnungswesen / Technologie • Revision |
ISBN-10 | 0-471-26975-1 / 0471269751 |
ISBN-13 | 978-0-471-26975-5 / 9780471269755 |
Haben Sie eine Frage zum Produkt? |
Größe: 8,5 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich