
Access Denied
The Complete Guide to Protecting Your Business Online
Cathy Cronkhite, Jack McCullough
Résumé
And, with the number of employees operating from mobile offices and using portable devices for network and email access, security risks have also increased--making valuable systems even more vulnerable to attacks. Laptop theft also puts sensitive, unencrypted information at risk. Each year the number of significantly destructive security incidents--widely-publicized virus infections and denial of service attacks--is escalating, so how can companies protect their information effectively and economically? The answers can be found inside Access Denied.
This highly practical resource provides hands-on tools and strategies for selecting the right technology solutions for creating a successful and cost-effective security policy. This book helps bridge the gap between business and technology--addressing both the need for profit and the requirement to invest in stronger security technology. Covering everything from data encryption methods to distribution list management, the book addresses key security risks associated with email, Web sites, portable devices, ecommerce, networks and computer systems. Through use of real-world examples the expert authors explain concepts, terminology, and related business issues, and offer solid security recommendations for small- medium-, and large-sized companies. Appropriate for both technology-implementers and the non-IT audience this book is ideal for any executive or business owner wanting to secure their company's information, form an efficient response team, and maintain a competitive edge in today's fast-moving, high-tech environment.
Contents
- Acknowledgments
- Introduction
- Chapter 1 Understanding Hackers and How They Attack
- Chapter 2 Viruses, Hoaxes, and Other Computer Pests
- Chapter 3 Keeping Electronic Mail Under Control
- Chapter 4 Website and Ecommerce Security Issues
- Chapter 5 Encryption Types and Their Appropriate Use
- Chapter 6 Protecting Information from Loss, Fraud, and Theft
- Chapter 7 Network Security Weaknesses
- Chapter 8 Limiting Physical Access to Computer Systems
- Chapter 9 Remote Computing Concerns
- Chapter 10 Responding to Attacks
- Chapter 11 Establishing Safe Business Practices
- Appendix A Web Resources
- Appendix B Forms and Templates
- Glossary
- Index
L'auteur - Jack McCullough
Jack McCullough is founding consultant of Razorwire Information Security Consulting and a highly respected IT network and security expert. He has been the subject of frequent interviews with Ziff Davis Publications, Information Security Magazine, National Public Radio, and NBC news affiliates.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Cathy Cronkhite, Jack McCullough |
Parution | 01/08/2001 |
Nb. de pages | 284 |
Format | 16 x 23,5 |
Couverture | Relié |
Poids | 592g |
Intérieur | Noir et Blanc |
EAN13 | 9780072133684 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse