Information security best practices : 205 basic rules /

Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules&...

Full description

Saved in:
Bibliographic Details
Main Authors: Stefanek, George L
Corporate Authors: Elsevier Science & Technology
Published: Butterworth-Heinemann,
Publisher Address: Boston [Mass.] :
Publication Dates: 2002.
Literature type: eBook
Language: English
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781878707963
Summary: Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also
Carrier Form: 1 online resource (xii, 194 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9781878707963
1878707965
0080491545
9780080491547
Index Number: QA76
CLC: TP309
Contents: Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack -- Ch. 3 Awareness And Management Commitment To Security -- Ch. 4 Security Policy -- Ch. 5 Infosec Network Architecture Design -- Ch. 6 Selecting Security Hardware And Software -- Ch. 7 Physical Security -- Ch. 8 Network Hardware Security -- Ch. 9 Network Operating System Security -- Ch. 10 PC Operating System Security -- Ch. 11 Internet Security -- Ch. 12 Application Security -- Ch. 13 Software Validation And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Moni