
Computer Security Handbook, Set
- English
- PDF
- Available on iOS & Android
Computer Security Handbook, Set
About this book
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- COMPUTER SECURITY HANDBOOK (Volume 1)
- CONTENTS
- PREFACE
- ACKNOWLEDGMENTS
- ABOUT THE EDITORS
- ABOUT THE CONTRIBUTORS
- A NOTE TO THE INSTRUCTOR
- INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY
- INTRODUCTION TO PART II: THREATS AND VULNERABILITIES
- INTRODUCTION TO PART III: PREVENTION: TECHNICAL DEFENSES
- COMPUTER SECURITY HANDBOOK (Volume 2)
- CONTENTS
- PREFACE
- ACKNOWLEDGMENTS
- A NOTE TO THE INSTRUCTOR
- INTRODUCTION TO PART IV: PREVENTION: HUMAN FACTORS
- INTRODUCTION TO PART V: DETECTING SECURITY BREACHES
- INTRODUCTION TO PART VI: RESPONSE AND REMEDIATION
- INTRODUCTION TO PART VII: MANAGEMENT’S ROLE IN SECURITY
- INTRODUCTION TO PART VIII: PUBLIC POLICY AND OTHER CONSIDERATIONS
- INDEX