Handbook of information security Volume 3, Threats, vulnerabilities, prevention, detection, and management Volume 3, Threats, vulnerabilities, prevention, detection, and management
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
John Wiley
c2006.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627043306719 |
Tabla de Contenidos:
- HANDBOOK OF INFORMATION SECURITY: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3; Contents; Preface; Guide to The Handbook of Information Security; PART 1: Threats and Vulnerabilities to Information and Computing Infrastructures; Internal Security Threats; INTRODUCTION; EXTENT OF THE PROBLEM; CHARACTERISTICS AND MOTIVATIONS; INSIDER TYPOLOGY; FACTORS AND CAUSES; MITIGATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Physical Security Threats; INTRODUCTION; FUNDAMENTAL THREATS TO SUSTAINING INFORMATION; DISASTERS AND THE THREATS THEY BRING
- PHYSICAL MEANS OF MISAPPROPRIATING RESOURCESCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Fixed-Line Telephone System Vulnerabilities; INTRODUCTION; IMPLICATIONS OF A SECURE FIXED-LINE TELEPHONE SYSTEM; VULNERABILITIES OF TRADITIONAL FIXED-LINE TELEPHONE SYSTEMS; VULNERABILITIES OF THE EMERGING TELEPHONE TECHNOLOGY; COUNTERMEASURES FOR TELEPHONE SYSTEM VULNERABILITIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Mail Threats and Vulnerabilities; INTRODUCTION; SOCIAL AND ANTISOCIAL E-MAIL ISSUES; SPAM AND RELATED E-MAIL ABUSE
- E-MAIL ABUSE AND POLICY-BASED SOLUTIONSCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Commerce Vulnerabilities; INTRODUCTION; E-SHOPLIFTING; CREDIT CARD PAYMENTS; PROTECTING CREDIT CARD PAYMENTS; ONLINE AUCTIONS; NONREPUDIATION; TRUST AND REPUTATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hacking Techniques in Wired Networks Hacking; INTRODUCTION; PRINCIPLES OF HACKING; ATTACKS AGAINST THE INTERNET INFRASTRUCTURE; ATTACKS AGAINST END SYSTEMS OF THE INTERNET; ATTACKS AGAINST ENTERPRISE NETWORK SYSTEMS; CONCLUSION; ACKNOWLEDGEMENTS; GLOSSARY
- CROSS REFERENCESREFERENCES; Hacking Techniques in Wireless Networks; INTRODUCTION; WIRELESS LAN OVERVIEW; WIRELESS NETWORK SNIFFING; WIRELESS SPOOFING; WIRELESS NETWORK PROBING; AP WEAKNESSES; EQUIPMENT FLAWS; DENIAL OF SERVICE; MAN-IN-THE-MIDDLE ATTACKS; WAR DRIVING; WIRELESS SECURITY BEST PRACTICES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Computer Viruses and Worms; INTRODUCTION; TROJAN HORSES, VIRUSES, WORMS, RATS, AND OTHER BEASTS; FIRST GENERATION VIRUSES; MACRO VIRUSES; E-MAIL VIRUSES; WORMS ( FIRST AND THIRD GENERATION); DETECTION TECHNIQUES
- PREVENTION AND PROTECTION TECHNIQUESNON-PC PLATFORM VIRUSES; CONCLUSION; GLOSSARY; CROSS REFERENCES; FURTHER READING; Trojan Horse Programs; INTRODUCTION; HISTORY OF TROJAN HORSES; TYPES OF TROJAN HORSE ATTACKS; COVERT TROJAN HORSE ATTACKS; OVERT TROJAN HORSE ATTACKS; DEFENSES AGAINST TROJAN HORSE PROGRAMS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hoax Viruses and Virus Alerts; INTRODUCTION; RELATED ITEMS; VIRUS WARNING HOAXES; CHARACTERISTICS AND IDENTIFICATION; PROTECTION AND POLICY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING
- Hostile Java Applets