Jump to ratings and reviews
Rate this book

Computer and Information Security Handbook

Rate this book
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.

* Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise* Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions

928 pages, Hardcover

First published January 1, 2009

11 people are currently reading
107 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
16 (39%)
4 stars
16 (39%)
3 stars
8 (19%)
2 stars
0 (0%)
1 star
1 (2%)
Displaying 1 of 1 review
Profile Image for Mei Hua.
20 reviews1 follower
January 31, 2013
This is the most complete security book I have ever read. A book that describes every components really well, from malicious softwares, security to cryptography. It is also highly recommended to anybody learning network security.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.