Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security best practices2...
~
ScienceDirect (Online service)
Information security best practices205 basic rules /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Information security best practices/ by George L. Stefanek.
其他題名:
205 basic rules /
作者:
Stefanek, George L.
出版者:
Boston [Mass.] :Butterworth-Heinemann,c2002.
面頁冊數:
xii, 194 p. :ill. ;24 cm. +1 CD-ROM (4 3/4 in.)
標題:
Computer security. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.loc.gov/catdir/description/els031/2002016635.html
電子資源:
http://www.loc.gov/catdir/toc/els031/2002016635.html
ISBN:
9780080491547 (electronic bk.)
ISBN:
0080491545 (electronic bk.)
ISBN:
9781878707963 (paper)
ISBN:
1878707965 (paper)
Information security best practices205 basic rules /
Stefanek, George L.
Information security best practices
205 basic rules /[electronic resource] :by George L. Stefanek. - Boston [Mass.] :Butterworth-Heinemann,c2002. - xii, 194 p. :ill. ;24 cm. +1 CD-ROM (4 3/4 in.)
Includes bibliographical references and index.
Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack -- Ch. 3 Awareness And Management Commitment To Security -- Ch. 4 Security Policy -- Ch. 5 Infosec Network Architecture Design -- Ch. 6 Selecting Security Hardware And Software -- Ch. 7 Physical Security -- Ch. 8 Network Hardware Security -- Ch. 9 Network Operating System Security -- Ch. 10 PC Operating System Security -- Ch. 11 Internet Security -- Ch. 12 Application Security -- Ch. 13 Software Validation And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The Network -- Ch. 17 Maintenance And Troubleshooting Security -- Ch. 18 Training -- Ch. 19 Emergency Rules Against Attacks -- Index.
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080491547 (electronic bk.)Subjects--Topical Terms:
146870
Computer security.
Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: QA76.9.A25 / S744 2002eb
Dewey Class. No.: 005.8
Information security best practices205 basic rules /
LDR
:04147nmm 22003254a 4500
001
1000045932
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
070806s2002 maua sb 001 0 eng d
020
$a
9780080491547 (electronic bk.)
020
$a
0080491545 (electronic bk.)
020
$a
9781878707963 (paper)
020
$a
1878707965 (paper)
035
$a
(OCoLC)162598024
035
$a
ocn162598024
040
$a
OPELS
$c
OPELS
050
1 4
$a
QA76.9.A25
$b
S744 2002eb
082
0 4
$a
005.8
$2
22{me_controlnum}
100
1
$a
Stefanek, George L.
$3
1000060394
245
1 0
$a
Information security best practices
$h
[electronic resource] :
$b
205 basic rules /
$c
by George L. Stefanek.
260
$a
Boston [Mass.] :
$b
Butterworth-Heinemann,
$c
c2002.
300
$a
xii, 194 p. :
$b
ill. ;
$c
24 cm. +
$e
1 CD-ROM (4 3/4 in.)
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack -- Ch. 3 Awareness And Management Commitment To Security -- Ch. 4 Security Policy -- Ch. 5 Infosec Network Architecture Design -- Ch. 6 Selecting Security Hardware And Software -- Ch. 7 Physical Security -- Ch. 8 Network Hardware Security -- Ch. 9 Network Operating System Security -- Ch. 10 PC Operating System Security -- Ch. 11 Internet Security -- Ch. 12 Application Security -- Ch. 13 Software Validation And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The Network -- Ch. 17 Maintenance And Troubleshooting Security -- Ch. 18 Training -- Ch. 19 Emergency Rules Against Attacks -- Index.
520
$a
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security.
$3
146870
650
0
$a
Computer networks
$x
Security measures.
$3
146868
655
7
$a
Electronic books.
$2
local.
$3
172687
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781878707963
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781878707963
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/description/els031/2002016635.html
856
4 1
$3
Table of contents
$u
http://www.loc.gov/catdir/toc/els031/2002016635.html
0 筆讀者評論
館藏地:
全部
線上資料庫
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040089
線上資料庫
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入