John R Vacca: 5 books

Book cover of Computer and Information Security Handbook
by John R. Vacca
Language: English
Release Date: May 4, 2009

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and...
Book cover of Computer and Information Security Handbook
by John R. Vacca
Language: English
Release Date: May 10, 2017

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering...
Book cover of Cyber Security and IT Infrastructure Protection
by John R. Vacca
Language: English
Release Date: August 22, 2013

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions...
Book cover of Public Key Infrastructure

Public Key Infrastructure

Building Trusted Applications and Web Services

by John R. Vacca
Language: English
Release Date: May 11, 2004

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act
Book cover of Computer and Information Security Handbook
by John R. Vacca
Language: English
Release Date: November 5, 2012

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent...
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy