New Releases by John R. Vacca

John R. Vacca is the author of Computer and Information Security Handbook - Volume II. (2025), Solving Urban Infrastructure Problems Using Smart City Technologies (2020), Computer and Information Security Handbook (2013), System Forensics, Investigation, and Response (2011), Computer Forensics (2010).

1 - 30 of 33 results
>>

Computer and Information Security Handbook - Volume II.

release date: Jan 01, 2025

Solving Urban Infrastructure Problems Using Smart City Technologies

release date: Sep 22, 2020
Solving Urban Infrastructure Problems Using Smart City Technologies
Solving Urban Infrastructure Problems Using Smart City Technologies is the most complete guide for integrating next generation smart city technologies into the very foundation of urban areas worldwide, showing how to make urban areas more efficient, more sustainable, and safer. Smart cities are complex systems of systems that encompass all aspects of modern urban life. A key component of their success is creating an ecosystem of smart infrastructures that can work together to enable dynamic, real-time interactions between urban subsystems such as transportation, energy, healthcare, housing, food, entertainment, work, social interactions, and governance. Solving Urban Infrastructure Problems Using Smart City Technologies is a complete reference for building a holistic, system-level perspective on smart and sustainable cities, leveraging big data analytics and strategies for planning, zoning, and public policy. It offers in-depth coverage and practical solutions for how smart cities can utilize resident's intellectual and social capital, press environmental sustainability, increase personalization, mobility, and higher quality of life. - Brings together experts from academia, government and industry to offer state-of- the-art solutions for urban system problems, showing how smart technologies can be used to improve the lives of the billions of people living in cities across the globe - Demonstrates practical implementation solutions through real-life case studies - Enhances reader comprehension with learning aid such as hands-on exercises, questions and answers, checklists, chapter summaries, chapter review questions, exercise problems, and more

Computer and Information Security Handbook

release date: Jan 01, 2013
Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise.

System Forensics, Investigation, and Response

release date: Dec 01, 2011
System Forensics, Investigation, and Response
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field.

Computer Forensics

release date: Jan 01, 2010
Computer Forensics
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and include fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organization's internal computer security specialists with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems, ultimately saving the organization the high cost of hiring an outside team of computer forensic investigators.This updated Third Edition includes a comprehensive introduction to computer forensics investigative techniques and provides the knowledge and skills required to conduct a computer forensics investigation from initial discovery to completion. This book also provides the details for an organization's Computer Incident Response Team (CIRT); to collect, manage, and record digital evidence; and to leverage powerful software tools and techniques to uncover hidden or deleted information.Key topics include: Responding to incidents and investigating computer crime, conducting and managing an investigation, performing disk-based analysis, investigating information-hiding techniques, examining e-mail, tracing internet access, searching memory in real-time, and the forensics challenge competition.

Global System for Mobile Communication Best Practices Handbook

release date: Jan 01, 2009
Global System for Mobile Communication Best Practices Handbook
It is forecasted that cellular systems using digital technology will become the universal method of telecommunications. This book describes and explains the rapid advances in Global System for Mobil Communication (GSM). It provides coverage of the basics of GSM, as well as an introduction to advanced GSM concepts, specifications, networks, and services. It serves as a valuable resource for senior-level network engineers, network managers, data communication consultants, IT professionals, equipment providers, carrier and service provider personnel, system engineers, and consultants.

Biometric Technologies and Verification Systems

release date: Mar 16, 2007
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.* Contains elements such as Sidebars, Tips, Notes and URL links* Heavily illustrated with over 150 illustrations, screen captures, and photographs* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Practical Internet Security

release date: Jan 10, 2007
Practical Internet Security
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems. Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Optical Networking Best Practices Handbook

release date: Nov 28, 2006
Optical Networking Best Practices Handbook
Optical Networking Best Practices Handbook presents optical networking in a very comprehensive way for nonengineers needing to understand the fundamentals of fiber, high-capacity, high-speed equipment and networks, and upcoming carrier services. The book provides a practical understanding of fiber optics as a physical medium, sorting out single-mode versus multi-mode and the crucial concept of Dense Wave-Division Multiplexing.

Guide to Wireless Network Security

release date: Oct 16, 2006
Guide to Wireless Network Security
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.

Firewalls

release date: Jan 01, 2005
Firewalls
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. · Install and configure proxy-based and stateful-filtering firewalls · Protect internal IP addresses with NAT and deploy a secure DNS architecture · Develop an Internet/intranet security policy to protect your organization's systems and data · Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

The World's 20 Greatest Unsolved Problems

release date: Jan 01, 2005
The World's 20 Greatest Unsolved Problems
When Phebe Hedges, a woman in East Hampton, New York, walked into the sea in 1806, she made visible the historical experience of a family affected by the dreaded disorder of movement, mind, and mood her neighbors called St.Vitus's dance. Doctors later spoke of Huntington’s chorea, and today it is known as Huntington's disease. This book is the first history of Huntington’s in America. Starting with the life of Phebe Hedges, Alice Wexler uses Huntington’s as a lens to explore the changing meanings of heredity, disability, stigma, and medical knowledge among ordinary people as well as scientists and physicians. She addresses these themes through three overlapping stories: the lives of a nineteenth-century family once said to “belong to the disease”; the emergence of Huntington’s chorea as a clinical entity; and the early-twentieth-century transformation of this disorder into a cautionary eugenics tale. In our own era of expanding genetic technologies, this history offers insights into the social contexts of medical and scientific knowledge, as well as the legacy of eugenics in shaping both the knowledge and the lived experience of this disease.

Public Key Infrastructure

release date: May 11, 2004
Public Key Infrastructure
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act

Identity Theft

release date: Jan 01, 2003
Identity Theft
An overall plan on how to minimize readers risk of becoming a victim, this book was designed to help consumers and institutions ward off this ever-growing threat and to react quickly and effectively to recover from this type of crime. It is filled with checklists on who one should notify in case they become a victim and how to recover an identity.

The Essential Guide to Storage Area Networks

release date: Jan 01, 2002
The Essential Guide to Storage Area Networks
Storage Area Networks (SANs) enable companies to manage data but many potential users judge them too confusing to use. This volume offers guidance for businesses and IT professionals who wish to understand, use, and derive maximum business advantages from SANs. Vacca, an IT consultant and author, covers the entire SAN lifecycle, from planning and strategy to implementation and day-to-day administration. c. Book News Inc.

I-mode Crash Course

release date: Jan 01, 2002
I-mode Crash Course
This crash course provides telecom service providers with everything they need to get a full understanding of this new opportunity.

High-Speed Cisco Networks

release date: Dec 21, 2001
High-Speed Cisco Networks
High-Speed Cisco Networks: Planning, Design, and Implementation covers LAN/WAN technology and its benefits. The book lays out Cisco's complete line of products and describes their features and best applications. It provides critical details on routers and servers, switches and hubs, security products, network management tools, ATM products, other services and programs, and Internetwork Operating Systems (IOS). Cisco's routers, hubs, and switches are the core of the Internet and today's high-speed networks. Armed with this independent evaluation, the reader can design high-speed networks that meet current needs and scale to future requirements with confidence.

The Cabling Handbook

release date: Jan 01, 2001
The Cabling Handbook
Revision includes coverage of cable industry, home networking and A+ certification.

Net Privacy

release date: Jan 01, 2001
Net Privacy
In this timely guide, two acknowledged experts on e-business security issues arm companies that do business online with a complete blueprint for developing and implementing a privacy plan that satisfies their customers' desire for privacy while permitting them the latitude they need to do business competitively over the Internet. 25 illustrations.

Wireless Broadband Networks Handbook

release date: Jan 01, 2001
Wireless Broadband Networks Handbook
This book offers a first look at the emerging market of wireless broadband technology. Contains step-by-step instructions for installation and troubleshooting plus handy advice on equipment vendors and service providers.

Electronic Commerce

release date: Jan 01, 2001
Electronic Commerce
This updated version of Electronic Commerce covers everything from building Web sites, the various methods for transacting business on the Internet with EDI, and smart-carts, to the security issues that readers should be aware of. New material is included on Microsoft Commerce Server, SQL Enterprise Manager, Java Servelets, Smart Cards, and EDI.

Holograms & Holography : Design, Techniques, & Commercial Applications

release date: Jan 01, 2001
Holograms & Holography : Design, Techniques, & Commercial Applications
A comprehensive look at basic holographic principles, commercial applications, and the digital techniques used in creating them. The CD-ROM contains the latest and best holographic images and the software for their creation and manipulation.

Satellite Encryption

release date: Jan 01, 1999
Satellite Encryption
This work shows governments and organizations around the world how satellite encryption helps to preserve vital national secrets, limit attacks on a nation's information structure, and eliminate security and authentication obstacles to electronic commerce. It also discusses how, in the wrong hands, satellite encryption can be used to plan or cover up domestic and international crimes or overseas military operations.

MCSE

release date: Jan 01, 1999
MCSE
As an effective guide to passing the exam and as valuable tool after users begin running SMS 2, this book covers SMS site planning, installation configuration, and managing network clients. The CD-ROM contains an interactive training module to prepare students for the MCSE exam.

VRML Clearly Explained

release date: Jan 01, 1998
VRML Clearly Explained
VRML Clearly Explained thoroughly explains how to master the power of VRML 2.0 and VRML97, whether you are experienced or not. All the newest VRML standards and developments are provided, and a variety of possible applications are discussed, including advertising, biological sciences, data mining and warehousing, intranet solutions, and software development. This book also contains coverage of VRML browsers, including an essential comparison section.

Official Netscape Developer's Guide to AppFoundry Tools

release date: Dec 01, 1997
Official Netscape Developer's Guide to AppFoundry Tools
This developer's guide to AppFoundry tools looks at the development process for creating Netscape ONE (Open Network Environment) applications. It contains Netscape AppFoundry database and network applications and development tools built on Netscape ONE. Providing a collection of reusable applications, it also includes sample code and application development examples.

JavaScript Development

release date: Jan 01, 1997
JavaScript Development
JavaScript is a non-programmers version of Java, designed to make developing Internet applications more accessible to noncomputer experts. This book guides readers through the technology behind this powerful tool and explains how to maximize its potential. Since JavaScript complements essentially every publishing and development tool available for the Internet. The author thoroughly discusses how to integrate JavaScript into application development and how it is being used in all of the commercial applications already available. Perfect for novice and advanced programmers alike, this book clearly and skillfully illustrates how JavaScript can take World Wide Web browsers beyond text and images and into a world of powerful, full-fledged applications that run easily across the Internet as on a local machine. * A non-programmers comprehensive guide to understanding and using this hot new tool * Explains how to maximize "JavaScripting" potential by guiding readers step-by-step through the technology of Java and its integration into applications. * Includes a multi-platform CD-ROM filled with JavaScript freeware and shareware tools, as well as the author's sample applications and demos of commercial products

Intranet Security

release date: Jan 01, 1997
Intranet Security
In this comprehensive book, readers will find everything they need to know for setting up and maintaining an Intranet security plan. It covers everything from UNIX security issues, virus and antivirus software, disaster recovery, and social engineering. The CD includes security related demos and shareware.

Official Netscape LiveWire Pro Book

release date: Jan 01, 1997
Official Netscape LiveWire Pro Book
The "Official Netscape LiveWire Pro Book" shows readers how to maximize the Pro version of Netscape's newest development tool to create dynamic, live, multimedia Web pages--making communication across the Internet between applications easier and more productive than ever before. The CD contains all the code from the sample applications in the book.

Internet Security SECRETS

release date: Jan 01, 1996
Internet Security SECRETS
With each passing day, more and more people depend on the Internet for more and more services. This makes Internet security more important than ever. This important guide provides the technical, managerial, and philosophical framework needed to understand and utilize Internet security.
1 - 30 of 33 results
>>


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2025 Aboutread.com