FREE SHIPPING BOTH WAYS
ON EVERY ORDER!
LIST PRICE:
$235.67

Sorry, this item is currently unavailable.

Computer Security Handbook, Set

ISBN: 9780471716525 | 0471716529
Edition: 5th
Format: Paperback
Publisher: Wiley
Pub. Date: 2/9/2009

Why Rent from Knetbooks?

Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way!

Top 5 reasons to order all your textbooks from Knetbooks:

  • We have the lowest prices on thousands of popular textbooks
  • Free shipping both ways on ALL orders
  • Most orders ship within 48 hours
  • Need your book longer than expected? Extending your rental is simple
  • Our customer support team is always here to help
The classic and authoritative reference in the field of computer security, now completely updated and revisedWith the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them.With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC).Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including:1. Hardware Elements of Security2. Fundamentals of Cryptography and Steganography3. Mathematical models of information security4. Insider threats5. Social engineering and low-tech attacks6. Spam, phishing, and Trojans: attacks meant to fool7. Biometric authentication8. VPNs and secure remote access9. Securing Peer2Peer, IM, SMS, and collaboration tools10. U.S. legal and regulatory security issues, such as GLBA and SOXWhether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.


Please wait while this item is added to your cart...