Midlands State University Library
Image from Google Jackets

Computer and information security handbook / edited by John R. Vacca

Material type: TextText Morgan Kaufmann Publishers, [2017]Edition: Third editionDescription: 1237 pages illustrationsContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780128038437
Subject(s): LOC classification:
  • QA76.9.A25 VAC
Contents:
Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security; Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security
Summary: This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- Adapted from publisher's description
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Notes Date due Barcode
Core Collection Main Library Core Collection QA76.9.A25 COM (Browse shelf(Opens below)) 152404 Available Donation BK139747
Book Book Main Library Open Shelf QA76.9.A25 COM (Browse shelf(Opens below)) 152405 Available Donation BK139813
Book Book Main Library Open Shelf QA76.9.A25 COM (Browse shelf(Opens below)) 152406 Available Donation BK139819

Includes bibliographical references and index

Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security; Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security

This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.-- Adapted from publisher's description

There are no comments on this title.

to post a comment.