logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Computer and Information Security Handbook by John R. Vacca (Editor) ISBN 9780128038437, 0128038438

  • SKU: EBN-6803286
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.7

36 reviews
Instant download (eBook) Computer and Information Security Handbook after payment.
Authors:John R. Vacca (Editor)
Pages:1280 pages.
Year:2017
Editon:3
Publisher:Morgan Kaufmann
Language:english
File Size:30.76 MB
Format:pdf
ISBNS:9780128038437, 0128038438
Categories: Ebooks

Product desciption

(Ebook) Computer and Information Security Handbook by John R. Vacca (Editor) ISBN 9780128038437, 0128038438

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.
With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.
Online chapters can also be found on the book companion website:
https://www.elsevier.com/books-and-journals/book-companion/9780128038437
• Written by leaders in the field
• Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices
• Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products