WorldCat Identities

Vacca, John R.

Overview
Works: 79 works in 561 publications in 2 languages and 20,588 library holdings
Genres: Miscellanea  Handbooks and manuals  Juvenile works 
Roles: Author, Editor, Reviewer, Contributor, Creator, Other
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by John R Vacca
The world's 20 greatest unsolved problems by John R Vacca( Book )

9 editions published between 2004 and 2005 in English and held by 650 WorldCat member libraries worldwide

"Gain extensive knowledge of the most challenging scientific problems and learn from more than 60 of the world's foremost scientists - among them, 40 Nobel laureates. Expand your horizons with a wide range of advanced scientific theories and techniques."--Jacket
Computer and information security handbook by John R Vacca( Book )

41 editions published between 2009 and 2013 in English and held by 495 WorldCat member libraries worldwide

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems. --from publisher description
Identity theft by John R Vacca( Book )

8 editions published between 2003 and 2012 in English and held by 474 WorldCat member libraries worldwide

Provides advice for individuals, corporations, non-profit institutions, and Internet Service Providers on how to analyze the risks of identity theft, how to reduce the risk, and how to recover from it
Computer forensics : computer crime scene investigation by John R Vacca( Book )

30 editions published between 2002 and 2010 in English and Undetermined and held by 380 WorldCat member libraries worldwide

"Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world."--Back cover
The cabling handbook by John R Vacca( Book )

20 editions published between 1998 and 2001 in English and held by 312 WorldCat member libraries worldwide

Comprehensive guide to every aspect of LAN & telecommunications cabling, from planning through installation & management. Paper. DLC: Telecommunications wiring - Handbooks, manuals, etc
Net privacy : a guide to developing and implementing an ironclad ebusiness privacy plan by Michael Erbschloe( Book )

14 editions published in 2001 in English and Undetermined and held by 299 WorldCat member libraries worldwide

"Names, addresses, and purchase patterns of customers are legal tender, as valuable to marketers as they are to competitors. At the same time, these and other indispensable internal information are often protected behind paper-thin corporate firewalls - barriers that stand little chance against sophisticated computer hackers looking to compromise systems and steal information." "Net Privacy shows executives, consultants, technology designers, and other decision makers how to protect information privacy in today's competitive business arena."--Jacket
Guide to wireless network security by John R Vacca( Book )

19 editions published between 2004 and 2006 in English and held by 252 WorldCat member libraries worldwide

The steady growth of WiFi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks. Network and security staff must first evaluate a potentially confusing set of authentication and encryption mechanisms to be used in the network. Depending on the security selected, IT will then need to establish and document the enterprise WLAN security policy, including mechanisms to validate user compliance and monitor for inherent network vulnerabilities. With a defined policy in place, IT staff can turn their attentions to protecting the network from snooping and an ever-expanding list of wireless attacks. The Guide to Wireless Network Security addresses each of these areas in detail and identifies the real-world best practices needed to deploy and maintain a secure wireless network. Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. This guide includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). Guide to Wireless Network Security is designed for a professional audience composed of researchers and practitioners in industry and wireless networks administrators. This book is also suitable for graduate-level students in computer science and electrical engineering
Electronic commerce : on-line ordering and digital money by Peter Loshin( Book )

22 editions published between 2000 and 2004 in English and held by 241 WorldCat member libraries worldwide

An overview of electronic commerce that includes information on smart cards, Microsoft server options, digital currencies, B2B issues, online investing, security issues, and recent trends
Managing information security by John R Vacca( Book )

33 editions published between 2010 and 2014 in English and held by 214 WorldCat member libraries worldwide

"Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions". -- Cover
Network and system security by John R Vacca( Book )

34 editions published between 2010 and 2014 in English and held by 202 WorldCat member libraries worldwide

Provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues
System forensics, investigation, and response by John R Vacca( Book )

8 editions published between 2010 and 2011 in English and held by 201 WorldCat member libraries worldwide

"Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field."--Resource description page
Biometric technologies and verification systems by John R Vacca( Book )

20 editions published in 2007 in English and Undetermined and held by 193 WorldCat member libraries worldwide

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior
Practical Internet security by John R Vacca( Book )

15 editions published between 2006 and 2010 in English and held by 167 WorldCat member libraries worldwide

As organizers increase their systems links across enterprise-wide networks and VPNs, as well as their exposure to customers, competitors, browsers, and hackers, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This volume provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. This volume provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing web communications and sites. All systems administrators and IT security managers will find Practical Internet Security an essential practical resource. This book is also suitable for graduate-level students in computer science
Optical networking best practices handbook by John R Vacca( Book )

13 editions published between 2006 and 2008 in English and Japanese and held by 165 WorldCat member libraries worldwide

"Optical Networking Best Practices Handbook presents optical networking in a very comprehensive way for nonengineers needing to understand the fundamentals of fiber, high-capacity, high-speed equipment and networks, and upcoming carrier services. The book provides a practical understanding of fiber optics as a physical medium, sorting out single-mode versus multi-mode and the crucial concept of Dense Wave-Division Multiplexing"--Résumé de l'éditeur
Firewalls : jumpstart for network and systems administrators by John R Vacca( Book )

17 editions published between 2004 and 2005 in English and Undetermined and held by 150 WorldCat member libraries worldwide

Annotation
Wireless data demystified by John R Vacca( Book )

12 editions published between 2002 and 2003 in English and held by 114 WorldCat member libraries worldwide

High-speed Cisco networks by John R Vacca( Book )

16 editions published between 2001 and 2002 in English and held by 106 WorldCat member libraries worldwide

Annotation
I-mode crash course by John R Vacca( Book )

22 editions published between 2001 and 2002 in English and held by 77 WorldCat member libraries worldwide

Annotation Insider details on the worldĐ#8217;s most successful wireless Internet applicationThe wireless Internet service that dominates the Japanese market is coming to the United States and Europe. i-mode Crash Course helps you prepare, whether your interest is technical or financialĐ#8230;whether youĐ#8217;re offering the killer app or competing against itĐ#8230;even if youĐ#8217;re simply a consumer who wants to get on top of the latest technology. Author John VaccaĐ#8217;s big-picture focus includes installation, deployment and configuration. He provides the insights you need to analyze markets, predict results, and influence outcomes. Learn: How i-mode connects cell phones and other handhelds to the Internet for instant messaging, email, online shopping, real-time news, stocks, weather reports, and more Why i-mode beat out WAP Development secrets behind i-mode applications and the advantages of cHTML The Japanese market strategy and plans to take America and Europe this year
Cyber security and IT infrastructure protection by John R Vacca( Book )

15 editions published between 2013 and 2014 in English and held by 74 WorldCat member libraries worldwide

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues
Public key infrastructure : building trusted applications and web services by John R Vacca( Book )

17 editions published between 2002 and 2004 in English and held by 15 WorldCat member libraries worldwide

Public Key Infrastructure shows programmers and engineers how to build appropriate layers of security throughout the network, letting businesses put to rest the concerns of how to protect assets and freeing them to add value to employees and customers
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.28 (from 0.04 for Computer f ... to 0.56 for Optical ne ...)

The world's 20 greatest unsolved problems
Alternative Names
Vacca, J. 1947-

Vacca, J. R.

Vacca, John.

Vacca John 1947-....

Vacca, John R. 1947-...

ヴァッカ, ジョン・R

Languages
English (379)

Japanese (2)

Covers
Computer and information security handbookIdentity theftComputer forensics : computer crime scene investigationThe cabling handbookNet privacy : a guide to developing and implementing an ironclad ebusiness privacy planGuide to wireless network securityElectronic commerce : on-line ordering and digital moneyManaging information security