Download Computer Security Handbook
Computer Security Handbook (Epub & Pdf)

Overview :

Computer Security Handbook by Seymour Bosworth Details

The classic and reliable reference in the field of computer security, which is updated and fully revised with the persistence of large-scale computers; the proliferation of desktop computers, laptops and…

Computer Security Handbook synopsis

The classic and reliable reference in the field of computer security, which is updated and fully revised with the persistence of large-scale computers; the proliferation of desktop computers, laptops and handheld computers; and extensive international networks that connect them with the nature and extent of threats to computer security have grown tremendously. Now in its fifth edition, the Computer Security Guide continues to provide reliable guidance for identifying and eliminating such threats wherever possible, as well as to minimize any losses attributable to them.

With seventy-seven chapters contributed by a panel of specialists in this field, the new edition of coverage increased in both the scope and depth of all ten areas of the General Knowledge Authority identified by the International Association of Information Security Certificates (ISC). Seventy-seven chapters in the fifth edition, twenty-five completely new chapters, including: 1.

Hardware components of security 2. Basics of encryption and sound concealment 3.

Mathematical models for information security 4. Internal threats 5.

Social engineering and low-tech attacks 6. Spam, phishing, and Trojans: Attacks aimed at deceiving 7.

Biometric authentication 8. VPN and secure remote access 9.

Secure tools Peer2Peer, IM, SMS and collaboration 10. Legal and regulatory security issues of the United States, such as GLBA and SOX whether you are responsible for many computers T or one important, there are immediate steps you can take to protect your computer system and its contents.

The Computer Security Handbook, version 5, provides you with the protection of vital information and networks for your organization.



Please don't review this Book if you received a freebie for writing this review, or if you're connected in any way to the owner.