|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn893872901 |
003 |
OCoLC |
005 |
20231120111838.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
141027s1992 enk o 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e rda
|e pn
|c OPELS
|d N$T
|d YDXCP
|d EBLCP
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCA
|d STF
|d UKAHL
|d OCLCQ
|d LUN
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 893875021
|a 897647399
|
020 |
|
|
|a 9781483294742
|q (electronic bk.)
|
020 |
|
|
|a 1483294749
|q (electronic bk.)
|
020 |
|
|
|z 1856171639
|
020 |
|
|
|z 9781856171632
|
035 |
|
|
|a (OCoLC)893872901
|z (OCoLC)893875021
|z (OCoLC)897647399
|
050 |
|
4 |
|a QA76.9.A25
|b S34 1992eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a 54.89
|2 bcl
|
084 |
|
|
|a DAT 050f
|2 stub
|
084 |
|
|
|a DAT 120f
|2 stub
|
084 |
|
|
|a DAT 460f
|2 stub
|
100 |
1 |
|
|a Schifreen, Robert.
|
245 |
1 |
0 |
|a Data protection and security for personal computers :
|b a manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks /
|c by Robert Schifreen.
|
264 |
|
1 |
|a Oxford, UK :
|b Elsevier Advanced Technology,
|c [1992]
|
264 |
|
4 |
|c �1992
|
300 |
|
|
|a 1 online resource (xviii, 182 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's - easily and effectively.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Data Protection and Security for Personal Computers; Copyright Page; Table of Contents; Foreword; Introduction; Why You Need This Guide; Horror Stories; How To Read This Guide; THE ULTIMATE GOAL; Chapter 1. Where To Start; Analysing The Risks; Priorities; Monitoring Your Progress; Ignore The Press; Chapter 2. Security And The PC; The CPU Box; The Monitor; The Keyboard; Floppy Disks; The Hard Disk; Tape Streamers; The Modem; Fax Cards; The Operating System; DR-DOS; Chapter 3. What Motivates A Hacker?; Opportunity; Revenge; Curiosity; Greed; The Challenge.
|
505 |
8 |
|
|a Chapter 4. Tricks That Hackers UseStraight Past Reception; Keystroke Traps; Documentation; File Names; Refuse Areas; Chapter 5. The Manager's First Tasks; Senior Management Commitment; How To Inform Staff; Set Targets; Motivating Staff; A Sample Data Security And Integrity Policy; Enforcing Penalties; Handling Dismissals And Resignations; Contingency Planning; Chapter 6. If You Suspect A Security Breach; Installing Telephone Logs; Using Network Analysers; Keyboard Recorders; If Files Are Being Deleted; Involving The Police; Chapter 7. Employing A Security Manager; The Ideal Qualifications.
|
505 |
8 |
|
|a The Security Manager's DutiesChapter 8. Backup; Full And Incremental Backups; Backup Media; Choosing A Backup Program; Formulating A Backup Strategy; Motivating Staff To Take Backups; Verifying Backups; Storing Backups; Before Restoring; Chapter 9. Viruses; What Is A Virus?; Who Writes Them?; How Many Viruses Are There?; How Does One Catch A Virus?; Common Ways That Viruses Spread; How To Detect A Virus; What Is Not A Virus?; How To Protect Against Viruses; How To Choose A Virus Detector; In The Event Of An Infection; Chapter 10. Access Control; Proof Of Identity; Better Than Passwords.
|
505 |
8 |
|
|a Controlling InformationSoftware Solutions; Hardware Solutions; Doing It Yourself; What To Control?; Chapter 11. Secure Erasure; Chapter 12. Preventing Hardware Theft; Marking The Components; Preventing Removal Of Equipment; Hardware Audits; Chapter 13. Controlling Software Piracy; Why Software Gets Pirated; Care of Master Disks; The Software Audit; Generating Software Audit Reports; Detecting Pirated Software; Chapter 14. Encryption; Choosing An Encryptor; DES And RSA; Remnants; Problems And Caveats; ZIP, ARC, LZH And Other Archive Programs; Chapter 15. Security For Applications Packages.
|
505 |
8 |
|
|a TraceabilityCopy Protection; Cracking Copy Protection; Chapter 16. Insurance; Specialist Policies; What To Look For In A Policy; Chapter 17. Software Development; Chinese Walls; Protecting Source Code; Programmers' Tricks; Resignations And Dismissals; Copyright Considerations; Chapter 18. Troubleshooting; A File Has Been Accidentally Deleted; A Disk Has Been Accidentally Formatted; A Hard Disk Becomes Corrupted; A Floppy Disk Becomes Corrupted; A Protected Program Is Lost; A Backup Fails To Restore; A Virus Is Suspected; A Floppy Disk Gets Wet; A Floppy Disk Gets Scratched.
|
650 |
|
0 |
|a Microcomputers
|x Access control.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Local area networks (Computer networks)
|x Security measures.
|
650 |
|
6 |
|a Micro-ordinateurs
|x Acc�es
|x Contr�ole.
|0 (CaQQLa)201-0150199
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|0 (CaQQLa)201-0061151
|
650 |
|
6 |
|a R�eseaux locaux (Informatique)
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0262152
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Protection des donn�ees.
|2 eclas
|
650 |
|
7 |
|a S�ecurit�e informatique.
|2 eclas
|
650 |
|
7 |
|a Virus informatique.
|2 eclas
|
650 |
|
7 |
|a R�eseaux locaux.
|2 eclas
|
650 |
|
7 |
|a R�eseaux informatiques.
|2 eclas
|
650 |
|
7 |
|a Data protection
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Local area networks (Computer networks)
|x Security measures
|2 fast
|0 (OCoLC)fst01001219
|
650 |
|
7 |
|a Microcomputers
|x Access control
|2 fast
|0 (OCoLC)fst01019643
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|0 (DE-588)4011144-1
|
650 |
|
7 |
|a Personal Computer
|2 gnd
|0 (DE-588)4115533-6
|
650 |
1 |
7 |
|a Computerbeveiliging.
|2 gtt
|
650 |
1 |
7 |
|a Microcomputers.
|2 gtt
|
776 |
0 |
8 |
|i Print version:
|a Schifreen, Robert.
|t Data protection and security for personal computers
|z 1856171639
|w (DLC) 93111905
|w (OCoLC)36876934
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781856171632
|z Texto completo
|