Cyber Security and IT Infrastructure Protection and over 2 million other books are available for Amazon Kindle . Learn more
FREE Delivery in the UK.
Only 11 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Trade in your item
Get a £6.75
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Cyber Security and It Infrastructure Protection Paperback – 1 Sep 2013

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
"Please retry"
£17.00 £31.41

Trade In Promotion

Frequently Bought Together

Cyber Security and It Infrastructure Protection + The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Price For Both: £44.90

Buy the selected items together

Trade In this Item for up to £6.75
Trade in Cyber Security and It Infrastructure Protection for an Amazon Gift Card of up to £6.75, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

More About the Author

Discover books, learn about writers, and more.

Product Description


"The book consists of some 15 chapters, each one a contribution by a leading expert in his/her field. The editor is also an expert in his own right, having written some 73 books on IS and related matters over the past 30 years or so. a well-produced book with some good diagrams and charts." Score: 7 out of, February 2014

About the Author

John Vacca is an information technology consultant, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 72 books, including: Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012 ); System Forensics, Investigation, And Response (Publisher: Jones & Bartlett Learning (September 24, 2010); Managing Information Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Network and Systems Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Computer and Information Security Handbook (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 2, 2009)); Biometric Technologies and Verification Systems (Publisher: Elsevier Science & Technology Books (March 16, 2007)); Practical Internet Security (Hardcover): (Publisher: Springer (October 18, 2006)); Optical Networking Best Practices Handbook (Hardcover): (Publisher: Wiley-Interscience (November 28, 2006)); Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition (Publisher: Charles River Media (May 26, 2005) John Vacca has also written more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995. In addition, John is also an independent online book reviewer. Finally, John was one of the security consultants for the MGM movie titled: "AntiTrust," which was released on January 12, 2001.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 5 reviews
1 of 1 people found the following review helpful
By Sid B. 11 Jan 2014
By Sid F. Badakhsh - Published on
Format: Kindle Edition
This is an excellent book for those responsible for designing and maintaining a system that interacts with the Internet. The viability of today’s businesses is greatly dependent on use of the Internet. However, access to the Internet exposes an organization to the many individuals with expertise in unlawful access to private information. This book is a valuable tool in selecting and assembling the proper hardware/software to prevent malicious attacks by hackers. The author, once again, has complied information from many security field experts to write this book.
1 of 1 people found the following review helpful
Educational IT Security 18 Nov 2013
By Jan Yokley - Published on
Format: Kindle Edition
John Vacca has uniquely assembled computer security topics written by specialists in their field into a useful, well-organized handbook. The compilation of various experts allows thorough coverage of many diverse computer security topics. This book is targetted for technical schools and universities. The added exercises in this second edition will help tailor it to the educational environment.
1 of 1 people found the following review helpful
A keeper for the IT professional or engineer 2 Oct 2013
By D. Lee - Published on
Format: Kindle Edition
Another excellent book in a series published by Vacca and Syngress. This book in particular maps directly with the strategic and tactical efforts our IT department is invoking across our enterprise.
I find the detailed descriptions extremely helpful as I am a stakeholder at work who is trying to understand and better cooperate with the impositions of our IT group. The security issues are not going away and we all must better understand and proactively protect our valuable assets. This book will be a gem for me at work.
1 of 1 people found the following review helpful
Excellent reference 30 Sep 2013
By Lynn F. Lucas - Published on
Format: Kindle Edition
This book is a text for security professionals. It has the most current information on cyber security. It is an excellent addition to any library.
1 of 1 people found the following review helpful
Very well done and very informative! 29 Sep 2013
By M. Erbschloe - Published on
Format: Paperback
Cyber Security and IT Infrastructure Protections, by John Vacca and his team of experts, provides the most modern look at the security issues, problems, and solutions that security professionals and information technology managers face today. I highly recommend this book.
Were these reviews helpful? Let us know