Table of contents : Part I: Overview of System and Network Security: A Comprehensive Introduction 1. Building a Secure Organization 2. A Cryptography Primer 3. Detecting System Intrusions 4. Preventing System Intrusions 5. Guarding Against Network Intrusions 6. Securing Cloud Computing Systems 7. Fault Tolerance and Resilience in Cloud Computing Environments 8. Securing Web Applications, Services, and Servers 9. Unix and Linux Security 10. Eliminating the Security Weakness of Linux and Unix Operating Systems 11. Internet Security 12. The Botnet Problem 13. Intranet Security 14. Local Area Network Security 15. Wireless Network Security 16. Wireless Sensor Network Security 17. Cellular Network Security 18. RFID Security 19. Optical Network Security 20. Optical Wireless Security Part II: Managing Information Security 21. Information Security Essentials for IT Managers: Protecting Mission-Critical Systems 22. Security Management Systems 23. Policy-driven System Management 24. Information Technology Security Management 25. Online Identity and User Management Services 26. Intrusion Prevention and Detection Systems 27. TCP/IP Packet Analysis 28. The Enemy 29. Firewalls 30. Penetration Testing 31. What is Vulnerability Assessment? 32. Security Metrics: An Introduction and Literature Review Part III: Cyber, Network, And Systems Forensics Security And Assurance 33. Cyber Forensics 34. Cyber Forensics and Incident Response 35. Securing e-Discovery 36. Network Forensics Part IV: Encryption Technology 37. Data Encryption 38. Satellite Encryption 39. Public Key Infrastructur 40. Password-based Authenticated Key Establishment Protocols 41. Instant-Messaging Security Part V: Privacy And Access Management 42. Privacy on the Internet 43. Privacy-Enhancing Technologies 44. Personal Privacy Policies 45. Detection of Conflicts in Security Policies 46. Supporting User Privacy Preferences in Digital Interactions 47. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions 48. Virtual Private Networkse 49. Identity Theft 50. VoIP Security Part VI: Storage Security 51. SAN Security 52. Storage Area Networking Security Devices 53. Risk Management Part VII: Physical Security 54. Physical Security Essentials 55. Disaster Recovery 56. Biometrics 57. Homeland Security 58. Cyber Warfare 59. System Security 60. Securing the Infrastructure 61. Access Controls 62. Assessments and Audits 63. Fundamentals of Cryptography Part IX: Advanced Security 64. Security Through Diversity 65. Online e-Reputation Management Services 66. Content Filtering 67. Data Loss Protection 68. Satellite Cyber Attack Search and Destroy 69. Verifiable Voting Systems 70. Advanced Data Encryption Part X: Appendices Appendix A. Configuring Authentication Service on Microsoft Windows 7 Appendix B. Security Management and Resiliency Appendix C. List of Top Information and Network Security Implementation and Deployment Companies Appendix D. List of Security Products Appendix E. List of Security Standards Appendix F. List of Miscellaneous Security Resources Appendix G. Ensuring Built-in Frequency Hopping Spread Spectrum Wireless Network Security Appendix H. Configuring Wireless Internet Security Remote Access Appendix I. Frequently Asked Questions Appendix J. Case Studies