The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
- Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise
- Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints
- Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
|Item Weight:||6.41 pounds|
|Item Size:||2 x 11.25 x 11.25 inches|
|Package Weight:||6.65 pounds|
|Package Size:||8.5 x 2.1 x 2.1 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Morgan Kaufmann, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
mpn: illustrations, ean: 9780735617223, isbn: 0735617228,
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robus...
By Siriwardena Prabath
ean: 9781430268185, isbn: 1430268182,
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of e...
mpn: Illustrated, ean: 9781597499637, isbn: 1597499633,
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Secur...
By Addison-Wesley Professional
mpn: 36080949, ean: 9780321822130, isbn: 9780321822130,
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has d...