Information security best practices : 205 basic rules /
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules&...
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Boston [Mass.] :
Butterworth-Heinemann,
[2002]
|
| Subjects: | |
| Online Access: | Connect to the full text of this electronic book Publisher description Table of contents |
Table of Contents:
- Preface
- Ch. 1 Information Security Attacks And Vulnerabilities
- Ch. 2 Anatomy Of An Attack
- Ch. 3 Awareness And Management Commitment To Security
- Ch. 4 Security Policy
- Ch. 5 Infosec Network Architecture Design
- Ch. 6 Selecting Security Hardware And Software
- Ch. 7 Physical Security
- Ch. 8 Network Hardware Security
- Ch. 9 Network Operating System Security
- Ch. 10 PC Operating System Security
- Ch. 11 Internet Security
- Ch. 12 Application Security
- Ch. 13 Software Validation And Verification
- Ch. 14 Data Encryption
- Ch. 15 Configuration Management
- Ch. 16 Monitoring The Network
- Ch. 17 Maintenance And Troubleshooting Security
- Ch. 18 Training
- Ch. 19 Emergency Rules Against Attacks
- Index.