CONTENTS
PART I FOUNDATIONS OF COMPUTER SECURITY
1. Brief History and Mission of Information System Security
Seymour Bosworth and Robert V. Jacobson
M. E. Kabay
3. Toward a New Framework for Information Security
Donn B. Parker
4. Hardware Elements of Security
Seymour Bosworth and Stephen Cobb
5. Data Communications and Information Security
Raymond Panko
6. Network Topologies, Protocols, and Design
Gary C. Kessler and N. Todd Pritsky
Stephen Cobb and Corinne Lefrançois
8. Using a Common Language for Computer Security Incident Information
John D. Howard
9. Mathematical Models of Computer Security
Matt Bishop
10. Understanding Studies and Surveys of Computer Crime
M. E. Kabay
11. Fundamentals of Intellectual Property Law
William A. Zucker and Scott J. Nathan
PART II THREATS AND VULNERABILITIES
12. The Psychology of Computer Criminals
Q. Campbell and David M. Kennedy
13. The Dangerous Information Technology Insider: Psychological Characteristics and Career Patterns
Jerrold M. Post
Seymour Bosworth
15. Penetrating Computer Systems and Networks
Chey Cobb, Stephen Cobb, and M. E. Kabay
Robert Guess and Eric Salveggio
Robert Gezelter
Gary C. Kessler and Diane E. Levine
19. Social Engineering and Low-Tech Attacks
Karthik Raman, Susan Baumes, Kevin Beets, and Carl Ness
20. Spam, Phishing, and Trojans: Attacks Meant To Fool
Stephen Cobb ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.