Information Security Best Practices : 205 Basic Rules by George L. Stefanek (2002, Hardcover)

sgwebooks (119238)
99.5% positive feedback
Price:
US $57.75
ApproximatelyC $79.35
+ $16.14 shipping
Estimated delivery Mon, Sep 15 - Wed, Sep 24
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Good

About this product

Product Identifiers

PublisherElsevier Science & Technology
ISBN-101878707965
ISBN-139781878707963
eBay Product ID (ePID)1920189

Product Key Features

Number of Pages160 Pages
LanguageEnglish
Publication NameInformation Security Best Practices : 205 Basic Rules
SubjectComputer Science, Security / General, Information Management
Publication Year2002
TypeTextbook
AuthorGeorge L. Stefanek
Subject AreaComputers, Business & Economics
FormatHardcover

Dimensions

Item Weight14.8 Oz
Item Length9.2 in
Item Width7.1 in

Additional Product Features

Intended AudienceScholarly & Professional
LCCN2002-016635
Dewey Edition21
eBook FormatGlassBook
IllustratedYes
Dewey Decimal005.8
Table Of ContentPrefaceCh. 1 Information Security Attacks And VulnerabilitiesCh. 2 Anatomy Of An AttackCh. 3 Awareness And Management Commitment To SecurityCh. 4 Security PolicyCh. 5 Infosec Network Architecture DesignCh. 6 Selecting Security Hardware And SoftwareCh. 7 Physical SecurityCh. 8 Network Hardware SecurityCh. 9 Network Operating System SecurityCh. 10 PC Operating System SecurityCh. 11 Internet SecurityCh. 12 Application SecurityCh. 13 Software Validation And VerificationCh. 14 Data EncryptionCh. 15 Configuration ManagementCh. 16 Monitoring The NetworkCh. 17 Maintenance And Troubleshooting SecurityCh. 18 TrainingCh. 19 Emergency Rules Against AttacksIndex
SynopsisProtecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network, Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security.Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.
LC Classification NumberTK7868.P7V27 2002

All listings for this product

Buy It Now
Pre-owned
No ratings or reviews yet
Be the first to write a review