Cyber Security and IT Infrastructure Protection
5/5
()
Currently unavailable
Currently unavailable
About this ebook
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: • Checklists throughout each chapter to gauge understanding • Chapter Review Questions/Exercises and Case Studies • Ancillaries: Solutions Manual; slide package; figure files
This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
- Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertise
- Comprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpoints
- Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
John R. Vacca
John Vacca is an independent information technology consultant and researcher, professional writer, editor, reviewer, and author based in Pomeroy, Ohio, USA. Since 1982, John has authored, edited, and published more than 85 books, including Smart Cities Policies and Financing: Approaches and Solutions, Elsevier; Cloud Computing Security: Foundations and Challenges, Taylor and Francis/CRC Press; Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation, Elsevier; Online Terrorist Propaganda, Recruitment, and Radicalization, Taylor and Francis/CRC Press; Nanoscale Networking and Communications Handbook, Taylor and Francis/CRC Press; Handbook of Sensor Networking: Advanced Technologies and Applications, Taylor and Francis/CRC Press; Network and System Security 2/e, Elsevier/Syngress; Cyber Security and IT Infrastructure Protection, Elsevier/Syngress; and Managing Information Security 2/e, Elsevier/Syngress; among many others. John was a Configuration Management Specialist, Computer Specialist, and the Computer Security Official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. John has also been a security consultant for major motion pictures, including AntiTrust, Collateral, and Identity Theft: The Michelle Brown Story. He received his M.Sc. from Kansas State University and an MBA from Emporia State University and served in the United States Air Force from 1967-1971.
Read more from John R. Vacca
Biometric Technologies and Verification Systems Rating: 4 out of 5 stars4/5Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation Rating: 0 out of 5 stars0 ratingsOptical Networking Best Practices Handbook Rating: 0 out of 5 stars0 ratingsFirewalls: Jumpstart for Network and Systems Administrators Rating: 0 out of 5 stars0 ratings
Related to Cyber Security and IT Infrastructure Protection
Related ebooks
Managing Information Security Rating: 5 out of 5 stars5/5Network and System Security Rating: 4 out of 5 stars4/5System Assurance: Beyond Detecting Vulnerabilities Rating: 0 out of 5 stars0 ratingsSecurity Patterns: Integrating Security and Systems Engineering Rating: 0 out of 5 stars0 ratingsOS X Incident Response: Scripting and Analysis Rating: 0 out of 5 stars0 ratings“Exploring Computer Systems: From Fundamentals to Advanced Concepts”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsIndustrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Rating: 0 out of 5 stars0 ratingsWireless Reconnaissance in Penetration Testing Rating: 0 out of 5 stars0 ratingsRisk Management Framework: A Lab-Based Approach to Securing Information Systems Rating: 2 out of 5 stars2/5Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility Rating: 3 out of 5 stars3/5Security and Resilience in Intelligent Data-Centric Systems and Communication Networks Rating: 0 out of 5 stars0 ratingsMobile Security and Privacy: Advances, Challenges and Future Research Directions Rating: 5 out of 5 stars5/5A Beginner's Guide to Data Agglomeration and Intelligent Sensing Rating: 0 out of 5 stars0 ratingsElectronic Access Control Rating: 2 out of 5 stars2/5Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure Rating: 0 out of 5 stars0 ratingsRugged Embedded Systems: Computing in Harsh Environments Rating: 4 out of 5 stars4/5Hardware Security: A Hands-on Learning Approach Rating: 0 out of 5 stars0 ratingsCybersecurity for Connected Medical Devices Rating: 0 out of 5 stars0 ratingsHacking with Kali: Practical Penetration Testing Techniques Rating: 4 out of 5 stars4/5Process Safety and Big Data Rating: 0 out of 5 stars0 ratingsExecuting Windows Command Line Investigations: While Ensuring Evidentiary Integrity Rating: 0 out of 5 stars0 ratingsFault-Tolerant Systems Rating: 0 out of 5 stars0 ratingsManaging the Web of Things: Linking the Real World to the Web Rating: 0 out of 5 stars0 ratingsNetwork Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools Rating: 0 out of 5 stars0 ratingsSeven Deadliest Microsoft Attacks Rating: 0 out of 5 stars0 ratingsDesigning Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 Rating: 0 out of 5 stars0 ratingsSecuring the Internet of Things Rating: 5 out of 5 stars5/5Cybersecurity and Cognitive Science Rating: 0 out of 5 stars0 ratingsCISSP Study Guide Rating: 0 out of 5 stars0 ratingsNetwork Security Bible Rating: 2 out of 5 stars2/5
Enterprise Applications For You
Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Bitcoin For Dummies Rating: 4 out of 5 stars4/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratings101 Ready-to-Use Excel Formulas Rating: 4 out of 5 stars4/550 Useful Excel Functions: Excel Essentials, #3 Rating: 5 out of 5 stars5/5Excel Formulas and Functions 2020: Excel Academy, #1 Rating: 4 out of 5 stars4/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsEnterprise AI For Dummies Rating: 3 out of 5 stars3/5Excel Guide for Success Rating: 5 out of 5 stars5/5Microsoft Power Platform A Deep Dive: Dig into Power Apps, Power Automate, Power BI, and Power Virtual Agents (English Edition) Rating: 0 out of 5 stars0 ratingsExcel 2019 Bible Rating: 4 out of 5 stars4/5Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5Building Web Services with Microsoft Azure Rating: 0 out of 5 stars0 ratingsExcel 2019 For Dummies Rating: 3 out of 5 stars3/5Excel Formulas That Automate Tasks You No Longer Have Time For Rating: 5 out of 5 stars5/5Experts' Guide to OneNote Rating: 5 out of 5 stars5/5The New Email Revolution: Save Time, Make Money, and Write Emails People Actually Want to Read! Rating: 5 out of 5 stars5/5Mastering QuickBooks 2020: The ultimate guide to bookkeeping and QuickBooks Online Rating: 0 out of 5 stars0 ratingsLearning Microsoft Azure Rating: 4 out of 5 stars4/5QuickBooks Online For Dummies Rating: 0 out of 5 stars0 ratingsCreate Income through Self-Publishing: An Author's Approach on Generating Wealth by Self-Publishing Rating: 5 out of 5 stars5/5Data Governance: How to Design, Deploy and Sustain an Effective Data Governance Program Rating: 4 out of 5 stars4/5QuickBooks 2021 For Dummies Rating: 0 out of 5 stars0 ratingsQuickBooks 2023 All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsExcel Tips and Tricks Rating: 0 out of 5 stars0 ratings
Reviews for Cyber Security and IT Infrastructure Protection
1 rating0 reviews