Cyber security and IT infrastructure protection / (Record no. 24978)

LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013388292
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0124166814
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124166813 (pbk.)
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8 CY BE
TITLE STATEMENT
Title Cyber security and IT infrastructure protection /
Statement of responsibility, etc edited by John R. Vacca.
VARYING FORM OF TITLE
Title proper/short title Cyber security and information technology infrastructure protection
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Waltham, MA :
Publisher Syngress is an imprint of Elsevier,
Date c2014.
PHYSICAL DESCRIPTION
Extent xxiv, 356 p. :
Other Details ill. ;
Size 24 cm.
SUMMARY
Summary This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding. Chapter Review Questions/Exercises and Case Studies. Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc. Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Cyberterrorism
General Prevention.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer networks
General Security measures.
ADDED ENTRY
Name Vacca, John R.,
Role Editor.
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8
Public note Location Map
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 24452
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2602
ADDED ENTRY
-- 38617
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2014-10-23 MERIC 005.8 CY BE T0014202 2017-01-26 209.00 2017-01-26 REGULAR

Powered by Koha