Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security: The Complete Reference, Second Edition

Buy

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security―from concepts to details―this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.

Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.

  • Understand security concepts and building blocks
  • Identify vulnerabilities and mitigate risk
  • Optimize authentication and authorization
  • Use IRM and encryption to protect unstructured data
  • Defend storage devices, databases, and software
  • Protect network routers, switches, and firewalls
  • Secure VPN, wireless, VoIP, and PBX infrastructure
  • Design intrusion detection and prevention systems
  • Develop secure Windows, Java, and mobile applications
  • Perform incident response and forensic analysis
(HTML tags aren't allowed.)

Systems Engineering in Wireless Communications
Systems Engineering in Wireless Communications

This book provides the reader with a complete coverage of radio resource management for 3G wireless communications

Systems Engineering in Wireless Communications focuses on the area of radio resource management in third generation wireless communication systems from a systems engineering perspective. The authors...

OCP Oracle Database 11g: New Features for Administrators Exam Guide (Exam 1Z0-050) (Osborne Oracle Press)
OCP Oracle Database 11g: New Features for Administrators Exam Guide (Exam 1Z0-050) (Osborne Oracle Press)
A Fully Integrated Study System for OCP Exam 1Z0-050

Prepare for the Oracle Certified Professional Oracle Database 11g New Features for Administrators exam with help from this exclusive Oracle Press guide. In each chapter, you'll find challenging exercises, practice questions, a two-minute drill, and a chapter summary...

Blood Cells: A Practical Guide
Blood Cells: A Practical Guide

Blood Cells has been written with both the practising haematologist and the trainee in mind. It aims to provide a guide for use in the diagnostic haematology laboratory, covering methods of collection of blood specimens, blood film preparation and staining, the principles of manual and automated blood counts and the assessment of the...


Hadoop in Practice
Hadoop in Practice

Summary

Hadoop in Practice collects 85 Hadoop examples and presents them in a problem/solution format. Each technique addresses a specific task you'll face, like querying big data using Pig or writing a log file loader. You'll explore each problem step by step, learning both how to build and deploy...

Getting Started with Fluidinfo
Getting Started with Fluidinfo

Imagine a public storage system that has a place online for structured data about everything that exists—or that could exist. This book introduces Fluidinfo, a system that enables you to store information about anything, real or imaginary, in any digital form. You’ll learn how to organize and search for data, and decide...

Algorithms for Approximation: Proceedings of the 5th International Conference, Chester, July 2005
Algorithms for Approximation: Proceedings of the 5th International Conference, Chester, July 2005

Approximation methods are of vital importance in many challenging applications from computational science and engineering. This book collects papers from world experts in a broad variety of relevant applications of approximation theory, including pattern recognition and machine learning, multiscale modelling of fluid flow, metrology,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy