Handbook of information security Volume 3, Threats, vulnerabilities, prevention, detection, and management Volume 3, Threats, vulnerabilities, prevention, detection, and management

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bidgoli, Hossein, author (author), Bidgoli, Hossein (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley c2006.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627043306719
Tabla de Contenidos:
  • HANDBOOK OF INFORMATION SECURITY: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3; Contents; Preface; Guide to The Handbook of Information Security; PART 1: Threats and Vulnerabilities to Information and Computing Infrastructures; Internal Security Threats; INTRODUCTION; EXTENT OF THE PROBLEM; CHARACTERISTICS AND MOTIVATIONS; INSIDER TYPOLOGY; FACTORS AND CAUSES; MITIGATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Physical Security Threats; INTRODUCTION; FUNDAMENTAL THREATS TO SUSTAINING INFORMATION; DISASTERS AND THE THREATS THEY BRING
  • PHYSICAL MEANS OF MISAPPROPRIATING RESOURCESCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Fixed-Line Telephone System Vulnerabilities; INTRODUCTION; IMPLICATIONS OF A SECURE FIXED-LINE TELEPHONE SYSTEM; VULNERABILITIES OF TRADITIONAL FIXED-LINE TELEPHONE SYSTEMS; VULNERABILITIES OF THE EMERGING TELEPHONE TECHNOLOGY; COUNTERMEASURES FOR TELEPHONE SYSTEM VULNERABILITIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Mail Threats and Vulnerabilities; INTRODUCTION; SOCIAL AND ANTISOCIAL E-MAIL ISSUES; SPAM AND RELATED E-MAIL ABUSE
  • E-MAIL ABUSE AND POLICY-BASED SOLUTIONSCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; E-Commerce Vulnerabilities; INTRODUCTION; E-SHOPLIFTING; CREDIT CARD PAYMENTS; PROTECTING CREDIT CARD PAYMENTS; ONLINE AUCTIONS; NONREPUDIATION; TRUST AND REPUTATION; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hacking Techniques in Wired Networks Hacking; INTRODUCTION; PRINCIPLES OF HACKING; ATTACKS AGAINST THE INTERNET INFRASTRUCTURE; ATTACKS AGAINST END SYSTEMS OF THE INTERNET; ATTACKS AGAINST ENTERPRISE NETWORK SYSTEMS; CONCLUSION; ACKNOWLEDGEMENTS; GLOSSARY
  • CROSS REFERENCESREFERENCES; Hacking Techniques in Wireless Networks; INTRODUCTION; WIRELESS LAN OVERVIEW; WIRELESS NETWORK SNIFFING; WIRELESS SPOOFING; WIRELESS NETWORK PROBING; AP WEAKNESSES; EQUIPMENT FLAWS; DENIAL OF SERVICE; MAN-IN-THE-MIDDLE ATTACKS; WAR DRIVING; WIRELESS SECURITY BEST PRACTICES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Computer Viruses and Worms; INTRODUCTION; TROJAN HORSES, VIRUSES, WORMS, RATS, AND OTHER BEASTS; FIRST GENERATION VIRUSES; MACRO VIRUSES; E-MAIL VIRUSES; WORMS ( FIRST AND THIRD GENERATION); DETECTION TECHNIQUES
  • PREVENTION AND PROTECTION TECHNIQUESNON-PC PLATFORM VIRUSES; CONCLUSION; GLOSSARY; CROSS REFERENCES; FURTHER READING; Trojan Horse Programs; INTRODUCTION; HISTORY OF TROJAN HORSES; TYPES OF TROJAN HORSE ATTACKS; COVERT TROJAN HORSE ATTACKS; OVERT TROJAN HORSE ATTACKS; DEFENSES AGAINST TROJAN HORSE PROGRAMS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Hoax Viruses and Virus Alerts; INTRODUCTION; RELATED ITEMS; VIRUS WARNING HOAXES; CHARACTERISTICS AND IDENTIFICATION; PROTECTION AND POLICY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING
  • Hostile Java Applets