Cargando…

Data protection and security for personal computers : a manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks /

Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's - easily and effectively.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schifreen, Robert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, UK : Elsevier Advanced Technology, [1992]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn893872901
003 OCoLC
005 20231120111838.0
006 m o d
007 cr cnu---unuuu
008 141027s1992 enk o 001 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d N$T  |d YDXCP  |d EBLCP  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCA  |d STF  |d UKAHL  |d OCLCQ  |d LUN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 893875021  |a 897647399 
020 |a 9781483294742  |q (electronic bk.) 
020 |a 1483294749  |q (electronic bk.) 
020 |z 1856171639 
020 |z 9781856171632 
035 |a (OCoLC)893872901  |z (OCoLC)893875021  |z (OCoLC)897647399 
050 4 |a QA76.9.A25  |b S34 1992eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a 54.89  |2 bcl 
084 |a DAT 050f  |2 stub 
084 |a DAT 120f  |2 stub 
084 |a DAT 460f  |2 stub 
100 1 |a Schifreen, Robert. 
245 1 0 |a Data protection and security for personal computers :  |b a manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks /  |c by Robert Schifreen. 
264 1 |a Oxford, UK :  |b Elsevier Advanced Technology,  |c [1992] 
264 4 |c �1992 
300 |a 1 online resource (xviii, 182 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's - easily and effectively. 
588 0 |a Print version record. 
505 0 |a Front Cover; Data Protection and Security for Personal Computers; Copyright Page; Table of Contents; Foreword; Introduction; Why You Need This Guide; Horror Stories; How To Read This Guide; THE ULTIMATE GOAL; Chapter 1. Where To Start; Analysing The Risks; Priorities; Monitoring Your Progress; Ignore The Press; Chapter 2. Security And The PC; The CPU Box; The Monitor; The Keyboard; Floppy Disks; The Hard Disk; Tape Streamers; The Modem; Fax Cards; The Operating System; DR-DOS; Chapter 3. What Motivates A Hacker?; Opportunity; Revenge; Curiosity; Greed; The Challenge. 
505 8 |a Chapter 4. Tricks That Hackers UseStraight Past Reception; Keystroke Traps; Documentation; File Names; Refuse Areas; Chapter 5. The Manager's First Tasks; Senior Management Commitment; How To Inform Staff; Set Targets; Motivating Staff; A Sample Data Security And Integrity Policy; Enforcing Penalties; Handling Dismissals And Resignations; Contingency Planning; Chapter 6. If You Suspect A Security Breach; Installing Telephone Logs; Using Network Analysers; Keyboard Recorders; If Files Are Being Deleted; Involving The Police; Chapter 7. Employing A Security Manager; The Ideal Qualifications. 
505 8 |a The Security Manager's DutiesChapter 8. Backup; Full And Incremental Backups; Backup Media; Choosing A Backup Program; Formulating A Backup Strategy; Motivating Staff To Take Backups; Verifying Backups; Storing Backups; Before Restoring; Chapter 9. Viruses; What Is A Virus?; Who Writes Them?; How Many Viruses Are There?; How Does One Catch A Virus?; Common Ways That Viruses Spread; How To Detect A Virus; What Is Not A Virus?; How To Protect Against Viruses; How To Choose A Virus Detector; In The Event Of An Infection; Chapter 10. Access Control; Proof Of Identity; Better Than Passwords. 
505 8 |a Controlling InformationSoftware Solutions; Hardware Solutions; Doing It Yourself; What To Control?; Chapter 11. Secure Erasure; Chapter 12. Preventing Hardware Theft; Marking The Components; Preventing Removal Of Equipment; Hardware Audits; Chapter 13. Controlling Software Piracy; Why Software Gets Pirated; Care of Master Disks; The Software Audit; Generating Software Audit Reports; Detecting Pirated Software; Chapter 14. Encryption; Choosing An Encryptor; DES And RSA; Remnants; Problems And Caveats; ZIP, ARC, LZH And Other Archive Programs; Chapter 15. Security For Applications Packages. 
505 8 |a TraceabilityCopy Protection; Cracking Copy Protection; Chapter 16. Insurance; Specialist Policies; What To Look For In A Policy; Chapter 17. Software Development; Chinese Walls; Protecting Source Code; Programmers' Tricks; Resignations And Dismissals; Copyright Considerations; Chapter 18. Troubleshooting; A File Has Been Accidentally Deleted; A Disk Has Been Accidentally Formatted; A Hard Disk Becomes Corrupted; A Floppy Disk Becomes Corrupted; A Protected Program Is Lost; A Backup Fails To Restore; A Virus Is Suspected; A Floppy Disk Gets Wet; A Floppy Disk Gets Scratched. 
650 0 |a Microcomputers  |x Access control. 
650 0 |a Data protection. 
650 0 |a Local area networks (Computer networks)  |x Security measures. 
650 6 |a Micro-ordinateurs  |x Acc�es  |x Contr�ole.  |0 (CaQQLa)201-0150199 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 6 |a R�eseaux locaux (Informatique)  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0262152 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Protection des donn�ees.  |2 eclas 
650 7 |a S�ecurit�e informatique.  |2 eclas 
650 7 |a Virus informatique.  |2 eclas 
650 7 |a R�eseaux locaux.  |2 eclas 
650 7 |a R�eseaux informatiques.  |2 eclas 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Local area networks (Computer networks)  |x Security measures  |2 fast  |0 (OCoLC)fst01001219 
650 7 |a Microcomputers  |x Access control  |2 fast  |0 (OCoLC)fst01019643 
650 7 |a Datensicherung  |2 gnd  |0 (DE-588)4011144-1 
650 7 |a Personal Computer  |2 gnd  |0 (DE-588)4115533-6 
650 1 7 |a Computerbeveiliging.  |2 gtt 
650 1 7 |a Microcomputers.  |2 gtt 
776 0 8 |i Print version:  |a Schifreen, Robert.  |t Data protection and security for personal computers  |z 1856171639  |w (DLC) 93111905  |w (OCoLC)36876934 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781856171632  |z Texto completo