Table of Contents
List of Figures
- Figures in Chapter 1
- Figures in Chapter 2
- Figures in Chapter 3
- Figures in Chapter 4
- Figures in Chapter 5
- Figures in Chapter 6
- Figures in Chapter 7
- Figures in Chapter 8
- Figures in Chapter 9
- Figures in Chapter 10
- Figures in Chapter 11
- Figures in Chapter 12
- Figures in Chapter 14
- Figures in Chapter 15
- Figures in Chapter e16
- Figures in Chapter 17
- Figures in Chapter 18
- Figures in Chapter 19
- Figures in Chapter 20
- Figures in Chapter 21
- Figures in Chapter e22
- Figures in Chapter e23
- Figures in Chapter 24
- Figures in Chapter 25
- Figures in Chapter 26
- Figures in Chapter e27
- Figures in Chapter e28
- Figures in Chapter 29
- Figures in Chapter 31
- Figures in Chapter e32
- Figures in Chapter 33
- Figures in Chapter 34
- Figures in Chapter 36
- Figures in Chapter 38
- Figures in Chapter 39
- Figures in Chapter 40
- Figures in Chapter 41
- Figures in Chapter 42
- Figures in Chapter e43
- Figures in Chapter e46
- Figures in Chapter 47
- Figures in Chapter 48
- Figures in Chapter e49
- Figures in Chapter 50
- Figures in Chapter 51
- Figures in Chapter 53
- Figures in Chapter e54
- Figures in Chapter 55
- Figures in Chapter 56
- Figures in Chapter 57
- Figures in Chapter 58
- Figures in Chapter e59
- Figures in Chapter 60
- Figures in Chapter e61
- Figures in Chapter 62
- Figures in Chapter 63
- Figures in Chapter 64
- Figures in Chapter 65
- Figures in Chapter 66
- Figures in Chapter 67
- Figures in Chapter 68
- Figures in Chapter 69
- Figures in Chapter e70
- Figures in Chapter 71
- Figures in Chapter 72
- Figures in Chapter e73
- Figures in Chapter e74
- Figures in Chapter e76
- Figures in Chapter 77
- Figures in Chapter 78
- Figures in Chapter e79
- Figures in Chapter 80
- Figures in Chapter 81
- Figures in Chapter e82
- Figures in Chapter 83
- Figures in Chapter 84
- Figures in Chapter 85
- Figures in Chapter 86
- Figures in Chapter e87
- Figures in Chapter 88
- Figures in Chapter 89
- Figures in Chapter e90
- Figures in Chapter 91
List of Tables
- Tables in Chapter 2
- Tables in Chapter 3
- Tables in Chapter 5
- Tables in Chapter 6
- Tables in Chapter 9
- Tables in Chapter 12
- Tables in Chapter e16
- Tables in Chapter 19
- Tables in Chapter 20
- Tables in Chapter 21
- Tables in Chapter 31
- Tables in Chapter e32
- Tables in Chapter 34
- Tables in Chapter 36
- Tables in Chapter 38
- Tables in Chapter 40
- Tables in Chapter 41
- Tables in Chapter 42
- Tables in Chapter 44
- Tables in Chapter e46
- Tables in Chapter 48
- Tables in Chapter 50
- Tables in Chapter e54
- Tables in Chapter 55
- Tables in Chapter 56
- Tables in Chapter 57
- Tables in Chapter e59
- Tables in Chapter e61
- Tables in Chapter 63
- Tables in Chapter 69
- Tables in Chapter e70
- Tables in Chapter 72
- Tables in Chapter e73
- Tables in Chapter e74
- Tables in Chapter 75
- Tables in Chapter 77
- Tables in Chapter e79
- Tables in Chapter 81
- Tables in Chapter e87
- Tables in Chapter 91
Landmarks
Computer and Information Security Handbook
Third Edition
Table of Contents
Copyright
Morgan Kaufmann is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright 2017 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
ISBN: 978-0-12-803843-7
For information on all Morgan Kaufmann publications visit our website at https://www.elsevier.com/books-and-journals
Publisher: Todd Green
Acquisition Editor: Brian Romer
Editorial Project Manager: Charlie Kent
Production Project Manager: Priya Kumaraguruparan
Designer: Maria Ins Cruz
Typeset by TNQ Books and Journals
Dedication
This book is dedicated to my wife, Bee.
Contributors
Edward G. Amoroso (Chapters Senior Vice President, Chief Security Officer, TAG Cyber LLC
Jeffrey S. Bardin (Chapters Chief Intelligence Strategist, Treadstone 71 LLC, 515 Oakham Road, Barre, MA 01005
Cataldo Basile (Chapters Professor, Universita degli studi di Bergamo, Via Salvecchio 19, 24129 Bergamo Italy
Stefan Berthold (Tek. Lic., Karlstad University, Universitetsgatan 2 S-65469, Karlstad/Sweden
Gerald Beuchelt (Chapters Principal Software Systems Engineer, Demandware, Inc., Burlington, MA
Rahul Bhaskar (Chapters Professor, Department of Information Systems and Decision Sciences, California State University, LH 564, Fullerton, California 92834