The Secured Enterprise: Protecting Your Information Assets
Paul E. Proctor, F. Christian Byrnes
- 出版商: Prentice Hall
- 出版日期: 2002-02-28
- 售價: $1,500
- 貴賓價: 9.5 折 $1,425
- 語言: 英文
- 頁數: 336
- 裝訂: Paperback
- ISBN: 013061906X
- ISBN-13: 9780130619068
已過版
買這商品的人也買了...
-
$2,880$2,736 -
$980$774 -
$970Introduction to Algorithms, 2/e
-
$1,710$1,625 -
$920$727 -
$560$504 -
$450$351 -
$650$553 -
$620$558 -
$650$553 -
$760$600 -
$280$221 -
$620$527 -
$780$616 -
$690$538 -
$420$332 -
$720$562 -
$560$442 -
$580$458 -
$560$442 -
$800$760 -
$750$675 -
$690$538 -
$1,550$1,473 -
$399Hacking Exposed Computer Forensics (Paperback)
相關主題
商品描述
Securing your key digital and information assets in an age of insecurity.
Securing enterprise data, applications, and intellectual property has become THE critical issue for business decision-makers in this era of hackers and potential cyberterrorism. But until now, most books on information security have been written for programmers and networking professionals, not business people. The Secured Enterprise: Protecting Your Information Assets fills the gap, delivering a non-technical, business-focused briefing on every key aspect of information security: frompeople to process to technology.
- A guide to today's security threats—including cyberterrorism
- How to establish effective, realistic security policies
- The tools for defending your information assets
- Effective mechanisms for identification, authentication, and access control
- What firewalls can—and cannot—do
- Vulnerability scanners, virus detectors, and intrusion detection systems
- Virtual private networks: leveraging the cost savings without exposing your data to risk
- Securing B2B and B2C e-commerce
- How to evaluate third-party security products and services
- New security options for wireless applications
Security has gotten more complex with time, and it has become more difficult to distill it. After reading this book you will understand security better and be more prepared to apply it in your enterprise.
—Jeff Moss,
Founder, DEF CON President,
Black Hat, Inc
Table of
Contents
Foreword.
Acknowledgments.
Introduction: How to Read This Book.
I. INTRODUCTION TO SECURITY.
1. Introduction to Security.
2. Threat Briefing.
3. Security
Policies.
4. Authentication, Authorization, Access Control.
II. SECURITY TECHNOLOGIES.
5. Firewalls.
6. Vulnerability Scanners.
7. Virus Detection and
Content Filters.
8. Intrusion Detection.
9. Public Key Infrastructure
and Encryption.
10. Encrypted Communications.
11. Mobile Workers and
Wireless LANs.
12. Single Signon.
13. Digital Signatures and Electronic
Commerce.
III. IMPLEMENTATION.
14. Establishing a Security Program.
15. Security Assessments.
16. Managed Security Services.
17. Response and Recovery.
18.
Implementing Web and Internet Security.
IV. ODDS AND ENDS.
19. Legal Issues.
20. Putting It All Together.
Glossary.
Index.