Computer and Information Security Handbook

Product Description
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures.<... More >>

Computer and Information Security Handbook

5 replies
  1. Sid F. Badakhsh says:

    John Vacca has hit another homerun in his latest book. All of your security bases are covered by contributions from experts in the computer security field at universities and corporations. The current trend of sharing information on the Internet leaves computer data vulnerable to malicious attacks. This handbook provides the latest and most updated information essential for those responsible for security of data on your computers. Security measures apply not only to systems that are connected to the Internet but also to stand alone systems where multiple users share information. I highly recommend this handbook as the most comprehensive reference guide for computer establishments.
    Rating: 5 / 5

  2. L. E. Smith says:

    Being the author of many technical books himself, John Vacca knew the experts to assemble for this outstanding handbook. It is quite comprehensive and should be on the desk of anyone interested in information security. Computer security is an ever changing arena and this handbook is on the cutting edge.
    Rating: 5 / 5

  3. D. Lee says:

    Vacca’s newest book is wonderfully rich in detail and breadth regarding the ever important aspects of computer and data security. The books cover the wide spectrum of all aspects of network management and it’s security, and are written by contributing authors well known in their specific technical fields. Many of the chapter have tutorial material which provides the inexperienced reader a great overview of the subject matter. In addition the detailed issues and problems and implementation solutions are provided in an up to date manner. Computer security tehnology is a topic that is vital for information professionals. This reference book is a must-have on the shelf of anyone in this profession/field.
    Rating: 5 / 5

  4. M. Erbschloe says:

    This book will be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice. This is the first security compendium to provide an easy-to-read explanation of the technical aspects of information security.

    This book is a complete, technical guide that covers the details, principles, methods, and technologies of security systems. It also explains the practical applications and covers a number of topics critical for successful security design, implementation, and ongoing management.

    This book will be an invaluable read for practitioners, managers and IT personnel – in fact for anyone considering, or involved in, implementing information security systems or practices. Security and financial administrators, computer science professionals, and systems developers will all benefit from an enhanced understanding of this ever growing aspect of technology and information management.
    Rating: 5 / 5

  5. Carlos Rivera says:

    This book is an extremely valuable resource for anyone entering into the Information Security field. It is full of detailed technical information in many IT areas with a heavy focus on security systems, applications and networks.
    Rating: 5 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.