Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Access Denied
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Access Denied

Access Denied

The Complete Guide to Protecting Your Business Online

Cathy Cronkhite, Jack McCullough

284 pages, parution le 01/08/2001

Résumé

As more and more businesses today are relying heavily on computers, the issue of security is critical.

And, with the number of employees operating from mobile offices and using portable devices for network and email access, security risks have also increased--making valuable systems even more vulnerable to attacks. Laptop theft also puts sensitive, unencrypted information at risk. Each year the number of significantly destructive security incidents--widely-publicized virus infections and denial of service attacks--is escalating, so how can companies protect their information effectively and economically? The answers can be found inside Access Denied.

This highly practical resource provides hands-on tools and strategies for selecting the right technology solutions for creating a successful and cost-effective security policy. This book helps bridge the gap between business and technology--addressing both the need for profit and the requirement to invest in stronger security technology. Covering everything from data encryption methods to distribution list management, the book addresses key security risks associated with email, Web sites, portable devices, ecommerce, networks and computer systems. Through use of real-world examples the expert authors explain concepts, terminology, and related business issues, and offer solid security recommendations for small- medium-, and large-sized companies. Appropriate for both technology-implementers and the non-IT audience this book is ideal for any executive or business owner wanting to secure their company's information, form an efficient response team, and maintain a competitive edge in today's fast-moving, high-tech environment.

Contents

  • Acknowledgments
  • Introduction
  • Chapter 1 Understanding Hackers and How They Attack
  • Chapter 2 Viruses, Hoaxes, and Other Computer Pests
  • Chapter 3 Keeping Electronic Mail Under Control
  • Chapter 4 Website and Ecommerce Security Issues
  • Chapter 5 Encryption Types and Their Appropriate Use
  • Chapter 6 Protecting Information from Loss, Fraud, and Theft
  • Chapter 7 Network Security Weaknesses
  • Chapter 8 Limiting Physical Access to Computer Systems
  • Chapter 9 Remote Computing Concerns
  • Chapter 10 Responding to Attacks
  • Chapter 11 Establishing Safe Business Practices
  • Appendix A Web Resources
  • Appendix B Forms and Templates
  • Glossary
  • Index

L'auteur - Jack McCullough

Jack McCullough is founding consultant of Razorwire Information Security Consulting and a highly respected IT network and security expert. He has been the subject of frequent interviews with Ziff Davis Publications, Information Security Magazine, National Public Radio, and NBC news affiliates.

Caractéristiques techniques

  PAPIER
Éditeur(s) Mc Graw Hill
Auteur(s) Cathy Cronkhite, Jack McCullough
Parution 01/08/2001
Nb. de pages 284
Format 16 x 23,5
Couverture Relié
Poids 592g
Intérieur Noir et Blanc
EAN13 9780072133684

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription