Cargando…

Information security best practices : 205 basic rules /

Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules&...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stefanek, George L.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston [Mass.] : Butterworth-Heinemann, �2002.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn162598024
003 OCoLC
005 20231117015033.0
006 m o d
007 cr cn|||||||||
008 070806s2002 maua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d OCLCF  |d COO  |d YDXCP  |d IDEBK  |d NRU  |d U5D  |d B24X7  |d DEBBG  |d ALAUL  |d EBLCP  |d UKDOC  |d OCLCO  |d OCLCQ  |d OCL  |d LIV  |d MERUC  |d OCLCA  |d LND  |d D6H  |d OCLCQ  |d LEAUB  |d OL$  |d OCLCQ  |d BRF  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 55235126  |a 191035053  |a 606023266 
020 |a 9781878707963 
020 |a 1878707965 
020 |a 0080491545  |q (ebook) 
020 |a 9780080491547  |q (ebook) 
035 |a (OCoLC)162598024  |z (OCoLC)55235126  |z (OCoLC)191035053  |z (OCoLC)606023266 
050 4 |a QA76.9.A25  |b S744 2002eb 
082 0 4 |a 005.8  |2 22 
100 1 |a Stefanek, George L. 
245 1 0 |a Information security best practices :  |b 205 basic rules /  |c by George L. Stefanek. 
260 |a Boston [Mass.] :  |b Butterworth-Heinemann,  |c �2002. 
300 |a 1 online resource (xii, 194 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book. 
505 0 |a Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack -- Ch. 3 Awareness And Management Commitment To Security -- Ch. 4 Security Policy -- Ch. 5 Infosec Network Architecture Design -- Ch. 6 Selecting Security Hardware And Software -- Ch. 7 Physical Security -- Ch. 8 Network Hardware Security -- Ch. 9 Network Operating System Security -- Ch. 10 PC Operating System Security -- Ch. 11 Internet Security -- Ch. 12 Application Security -- Ch. 13 Software Validation And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The Network -- Ch. 17 Maintenance And Troubleshooting Security -- Ch. 18 Training -- Ch. 19 Emergency Rules Against Attacks -- Index. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Stefanek, George L.  |t Information security best practices.  |d Boston [Mass.] : Butterworth-Heinemann, �2002  |z 1878707965  |z 9781878707963  |w (DLC) 2002016635  |w (OCoLC)51511617 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781878707963  |z Texto completo