Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Information Security Best Practices 205 Basic Rules
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Information Security Best Practices 205 Basic Rules

Information Security Best Practices 205 Basic Rules

George L. Stefanek

206 pages, parution le 31/01/2003

Résumé

Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 “rules” designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional “tool kit.” It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security.

Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.

Contents

  • Information Security Attacks And Vulnerabilities
  • Anatomy Of An Attack
  • Awareness And Management Commitment To Security
  • Security Policy
  • INFOSEC Network Architecture Design
  • Rules Selecting Security Hardware And Software
  • Physical Security Rules
  • Network Hardware Security
  • Operating System Security Rules
  • PC Operating System Security Rules
  • Internet Security Rules
  • Application Security Rules
  • Software Validation And Verification Rules
  • Data Encryption Rules
  • Configuration Management Rules
  • Network Monitoring Rules
  • Maintenance And Troubleshooting Security Rules
  • Training
  • Emergency Rules Against Attacks

L'auteur - George L. Stefanek

George L. Stefanek, Ph.D., has over 18 years of experience as a systems administrator and manager of IS/IT departments. He has also consulted on information security issues for such clients as the U.S. Department of Defense.

Caractéristiques techniques

  PAPIER
Éditeur(s) Butterworth-Heinemann
Auteur(s) George L. Stefanek
Parution 31/01/2003
Nb. de pages 206
Format 17,8 x 23,4
Couverture Broché
Poids 430g
Intérieur Noir et Blanc
EAN13 9781878707963
ISBN13 978-1-878707-96-3

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription