
- 380 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cyber Security and IT Infrastructure Protection
About this book
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: ā¢Checklists throughout each chapter to gauge understandingā¢Chapter Review Questions/Exercises and Case Studiesā¢Ancillaries: Solutions Manual; slide package; figure filesThis format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.- Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertise- Comprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpoints- Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgements
- About the Editor
- Contributors
- Introduction
- Chapter 1. Fault Tolerance and Resilience in Cloud Computing Environments
- Chapter 2. Data Encryption
- Chapter 3. Public Key Infrastructure
- Chapter 4. Physical Security Essentials
- Chapter 5. Disaster Recovery
- Chapter 6. Biometrics
- Chapter 7. Homeland Security
- Chapter 8. Cyber Warfare
- Chapter 9. System Security
- Chapter 10. Securing the Infrastructure
- Chapter 11. Access Controls
- Chapter 12. Assessments and Audits
- Chapter 13. Fundamentals of Cryptography
- Chapter 14. Satellite Cyber Attack Search and Destroy
- Chapter 15. Advanced Data Encryption
- Index