Amazon cover image
Image from Amazon.com
Image from Google Jackets

Information security : the complete reference / Mark Rhodes-Ousley.

By: Material type: TextTextLanguage: English Publication details: India McGraw Hill Education 2013Edition: Second editionDescription: xxxix, 854 pages : illustrations ; 24 cmISBN:
  • 9781259098345
  • 9780071784351 (pbk.)
  • 0071784357 (pbk.)
Subject(s): DDC classification:
  • 005.8 23 OUS
Contents:
Part I Foundations 1 Information Security Overview 2 Risk Analysis 3 Compliance with Standards, Regulations, and Laws 4 Secure Design Principles 5 Security Policies, Standards, Procedures, and Guidelines 6 Security Organization 7 Authentication and Authorization Part II Data Security 8 Securing Unstructured Data 9 Information Rights Management 10 Encryption 11 Storage Security 12 Database Security Part III Network Security 13 Secure Network Design 14 Network Device Security 15 Firewalls 16 Virtual Private Networks 17 Wireless Network Security 18 Intrusion Detection and Prevention Systems 19 Voice over IP (VoIP) and PBX Security Part IV Computer Security 20 Operating System Security Models 21 Unix Security 22 Windows Security 23 Securing Infrastructure Services 24 Virtual Machines and Cloud Computing 25 Securing Mobile Devices Part V Application Security 26 Secure Application Design 27 Writing Secure Software 28 J2EE Security 29 Windows .NET Security 30 Controlling Application Behavior Part VI Security Operations 31 Security Operations Management 32 Disaster Recovery, Business Continuity, Backups, and High Availability 33 Incident Response and Forensic Analysis Part VII Physical Security 34 Physical Security
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
General Books General Books CUTN Central Library Generalia Non-fiction 005.8 OUS (Browse shelf(Opens below)) Available 29622
General Books General Books CUTN Central Library Generalia Non-fiction 005.8 OUS (Browse shelf(Opens below)) Available 29623
General Books General Books CUTN Central Library Generalia Non-fiction 005.8 OUS (Browse shelf(Opens below)) Available 29624
General Books General Books CUTN Central Library Generalia Non-fiction 005.8 OUS (Browse shelf(Opens below)) Available 29625
Reference Books Reference Books CUTN Central Library Reference Reference 005.8 OUS (Browse shelf(Opens below)) Not for loan 29626

Develop and implement an effective end-to-end security program Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security-from concepts to details-this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications.
In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis

Part I Foundations 1 Information Security Overview 2 Risk Analysis 3 Compliance with Standards, Regulations, and Laws 4 Secure Design Principles 5 Security Policies, Standards, Procedures, and Guidelines 6 Security Organization 7 Authentication and Authorization Part II Data Security 8 Securing Unstructured Data 9 Information Rights Management 10 Encryption 11 Storage Security 12 Database Security Part III Network Security 13 Secure Network Design 14 Network Device Security 15 Firewalls 16 Virtual Private Networks 17 Wireless Network Security 18 Intrusion Detection and Prevention Systems 19 Voice over IP (VoIP) and PBX Security Part IV Computer Security 20 Operating System Security Models 21 Unix Security 22 Windows Security 23 Securing Infrastructure Services 24 Virtual Machines and Cloud Computing 25 Securing Mobile Devices Part V Application Security 26 Secure Application Design 27 Writing Secure Software 28 J2EE Security 29 Windows .NET Security 30 Controlling Application Behavior Part VI Security Operations 31 Security Operations Management 32 Disaster Recovery, Business Continuity, Backups, and High Availability 33 Incident Response and Forensic Analysis Part VII Physical Security 34 Physical Security

Includes bibliographical references and index.

There are no comments on this title.

to post a comment.

Powered by Koha