Book description
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.
* Your one stop shop coverage of malware, wireless technologies, and phishing
*An easy to use tol featuring the ability to cross references makeing navigation easy
* Includes special coverage of military and government terms for the latest hot topics
Table of contents
- Cover (1/3)
- Cover (2/3)
- Cover (3/3)
- Author Acknowledgments
- Preface (1/2)
- Preface (2/2)
- Foreword by Gene Spafford, Purdue University
- Foreword by Fred Cohen, Security Posture, University of New Haven
- Foreword by Hal Tipton, CISSP, ISSAP, ISSMP
- Foreword by Peter G. Neumann, ACM Risks Forum Moderator
- Foreword by Jack Holleran, CISSP
- Introduction
- Symbols
- Numbers
- A (1/4)
- A (2/4)
- A (3/4)
- A (4/4)
- B (1/3)
- B (2/3)
- B (3/3)
- C (1/5)
- C (2/5)
- C (3/5)
- C (4/5)
- C (5/5)
- D (1/3)
- D (2/3)
- D (3/3)
- E (1/2)
- E (2/2)
- F (1/3)
- F (2/3)
- F (3/3)
- G
- H (1/2)
- H (2/2)
- I (1/3)
- I (2/3)
- I (3/3)
- J
- K
- L
- M (1/3)
- M (2/3)
- M (3/3)
- N
- O
- P (1/3)
- P (2/3)
- P (3/3)
- Q
- R (1/2)
- R (2/2)
- S (1/5)
- S (2/5)
- S (3/5)
- S (4/5)
- S (5/5)
- T (1/2)
- T (2/2)
- U
- V
- W
- X
- Y
- Z
- Appendix A
- Appendix B (1/4)
- Appendix B (2/4)
- Appendix B (3/4)
- Appendix B (4/4)
Product information
- Title: Dictionary of Information Security
- Author(s):
- Release date: August 2006
- Publisher(s): Syngress
- ISBN: 9780080488714
You might also like
book
Elsevier's Dictionary of Information Security
The dictionary will contain terms currently used in the broad fields of electronics data protection and …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Managing Security with Snort & IDS Tools
Intrusion detection is not for the faint at heart. But, if you are a network administrator …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …