
Defeating the Hacker
A non-technical guide to computer security
Résumé
The current struggle between IT security and computer hackers is reaching crisis point.
Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue.
Robert Schifreen, a self-confessed ex-hacker, made history in 1985 when he became the first person in the world to face a jury trial in connection with computer hacking. His subsequent acquittal in the High Court led to a change in UK Law and the introduction of the Computer Misuse Act 1990. His 20 years experience in IT security now lends itself to global radio and TV broadcasts, as well as appearances at conferences and lectures around the world.
Keeping your company's computers free from hackers, viruses, spammers, phishing attacks, social engineers and all the other things that can result in loss of data is a difficult job. Defeating the Hacker is a book about how to protect your computer systems becoming another victim of the hacker. It's an instant primer into all the things that can go wrong, with advice on how to stop it happening or, if it's too late, how to fix the damage.
- Presents unique, UK based, insider information on hacking and security from someone who has operated on both sides of the divide
- Develops a populist seam within a hot IT area: security
- Shows readers how and why hacking is made possible, whilst suggesting ways to avoid being a victim of it
- Written in a dynamic, conversational, yet knowledgeable, style
- Filled with information and anecdotal evidence aimed at IT professionals and those with a more general interest
Defeating the Hacker allows the reader to learn how to protect their computer systems with advice from someone who knows how to break into them.
Sommaire
- Introduction
- A Hacker is Made
- Preparation and Planning
- International Laws and Standards
- Passwords and Beyond
- Your Information Security Policy
- Security Awareness Training
- Patch Management
- Windows Workstation Security
- Basic Server Security
- Understanding Firewalls
- Protecting Your Web Site
- Wireless Networking
- Penetration Testing
- Security Through Obscurity
- Windows Vista
- The Curse of Spam
- Viruses
- Spyware, Adware and Rogue Diallers
- Piracy
- File Sharing and 'P2P'
- Backups and Archives
- Preventing Internet Misuse
- Document Security
- Data Theft
- Encryption
- Employees' Own Computers
- How Hackers Use Search Engines
- Denial of Service Attacks
- Provisioning and Identity Management
- Data Interception
- Out of the Office
- Social Engineering
- E-Commerce Fraud
- Intrusion Detection Systems
- Outsourcing
- Securing your Premises
- Forensics
- Planning for the Worst
- Hardware Theft
- Let's Be Careful Out There
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Robert Schifreen |
Parution | 03/03/2006 |
Nb. de pages | 398 |
Format | 15,5 x 23,5 |
Couverture | Relié |
Poids | 770g |
Intérieur | Noir et Blanc |
EAN13 | 9780470025550 |
ISBN13 | 978-0-470-02555-0 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet