Computer and Information Security Handbook (Hardcover)
暫譯: 計算機與資訊安全手冊 (精裝版)
John R. Vacca
- 出版商: Morgan Kaufmann
- 出版日期: 2009-05-01
- 定價: $2,800
- 售價: 5.0 折 $1,400
- 語言: 英文
- 頁數: 928
- 裝訂: Hardcover
- ISBN: 0123743540
- ISBN-13: 9780123743541
-
相關分類:
資訊安全
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$2,460$2,337 -
$2,831The Design of the UNIX Operating System (Paperback)
-
$2,540$2,413 -
$480$379 -
$1,330Introduction to Modern Cryptography: Principles and Protocols (Hardcover)
-
$690$587 -
$580$493 -
$1,570$1,492 -
$580$458 -
$580$493 -
$940$700 -
$780$616 -
$680$537 -
$590$502 -
$580$458 -
$420$357 -
$800$720 -
$2,900$2,755 -
$580$493 -
$1,750,800$1,663,260 -
$857QEMU/KVM 源碼解析與應用
-
$680$537 -
$980$774 -
$2,450$2,328 -
$780$663
相關主題
商品描述
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures.
In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems.
From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients.
Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications.
This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security.
- Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise.
- This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.
- Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.
商品描述(中文翻譯)
這本書提供了如何分析網路風險的資訊,以及選擇和部署適當對策以減少對物理和網路威脅的暴露所需的步驟。它還傳授了識別和應對一些基本安全風險和需求所需的技能和知識,包括網際網路安全威脅和措施(如審計追蹤、IP 偵聽/偽造等),以及如何實施安全政策和程序。
此外,本書還涵蓋了針對特定漏洞和威脅的安全和網路設計。它還涉及風險評估和緩解,以及安全系統的審計和測試。
讀者將從本書中學到應用建立安全 VPN 所需的標準和技術,配置客戶端軟體和伺服器作業系統、啟用 IPsec 的路由器、防火牆和 SSL 客戶端。
章節內容包括識別漏洞並實施適當的對策,以防止和減輕對關鍵任務流程的威脅。探討了創建業務持續性計畫(BCP)的技術以及建立支持其有效實施的基礎設施的方法論。
公鑰基礎設施(PKI)在確保企業的機密性、完整性和身份驗證方面越來越重要。本書將提供選擇、設計和部署 PKI 以保護現有和未來應用所需的基本知識和技能。
本書將討論漏洞掃描器以檢測安全弱點和預防技術,同時允許訪問關鍵服務的同時保持系統安全。
- 由該領域的領導者貢獻的章節涵蓋了計算機安全技術的理論和實踐,使讀者能夠發展出新的技術專業水平。
- 本書對安全問題的全面和最新的涵蓋促進了學習,並使讀者能夠從多個角度保持最新和充分了解。
- 提供分析方法和問題解決技術,增強讀者對材料的理解和實施實際解決方案的能力。