Information security best practices : 205 basic rules /
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules&...
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Published: |
Butterworth-Heinemann,
|
Publisher Address: | Boston [Mass.] : |
Publication Dates: | 2002. |
Literature type: | eBook |
Language: | English |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9781878707963 |
Summary: |
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also |
Carrier Form: | 1 online resource (xii, 194 pages) : illustrations |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9781878707963 1878707965 0080491545 9780080491547 |
Index Number: | QA76 |
CLC: | TP309 |
Contents: | Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack -- Ch. 3 Awareness And Management Commitment To Security -- Ch. 4 Security Policy -- Ch. 5 Infosec Network Architecture Design -- Ch. 6 Selecting Security Hardware And Software -- Ch. 7 Physical Security -- Ch. 8 Network Hardware Security -- Ch. 9 Network Operating System Security -- Ch. 10 PC Operating System Security -- Ch. 11 Internet Security -- Ch. 12 Application Security -- Ch. 13 Software Validation And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Moni |