|
|
|
|
LEADER |
05001nmm a2200541 u 4500 |
001 |
EB001914821 |
003 |
EBX01000000000000001077723 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9780128039298
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Vacca, John R.
|e editor
|
245 |
0 |
0 |
|a Computer and information security handbook
|c edited by John R. Vacca
|
250 |
|
|
|a Third edition
|
260 |
|
|
|a Cambridge, MA
|b Morgan Kaufmann Publishers
|c 2017
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a The Bad Guys Are Very SophisticatedManagement Sees Security as a Drain on the Bottom Line; 5. TEN STEPS TO BUILDING A SECURE ORGANIZATION; Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for Information Technology Staff: Now and Forever; Think ``Outside the Box''; DOXing; Train Employees: Develop a Culture of Security; Identify and Use Built-in Security Features of the Operating System and Applications; Monitor Systems
|
505 |
0 |
|
|a Part 10: Virtual SecurityPart 11: Cyber Physical Security; Part 12: Practical Security; Part 13: Critical Infrastructure Security; Part 14: Advanced Security; 2. SUPPLEMENTAL MATERIALS; Acknowledgments; I -- Overview of System and Network Security: A Comprehensive Introduction; 1 -- Information Security in the Modern Enterprise; 1. INTRODUCTION; Management Matters as Much as Technology; Trade Secrets and ``Reasonable Efforts''; 2. CHALLENGES FACING INFORMATION SECURITY; 3. ASSESSMENT AND PLANNING; Know Where to Begin; Risk Management; Public Standards for Information Security
|
505 |
0 |
|
|a Creating the Security Plan4. POLICIES AND PROCEDURES; 5. TRAINING; 6. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 -- Building a Secure Organization; 1. OBSTACLES TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. CURRENT TREND IS TO SHARE, NOT PROTECT; Data Accessible From Anywhere; 4. SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE.
|
505 |
0 |
|
|a Front Cover; Computer and Information Security Handbook; Computer and Information Security Handbook; Copyright; Dedication; Contents; Contributors; About the Editor; Foreword; Preface; 1. ORGANIZATION OF THIS BOOK; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Disaster Recovery Security; Part 4: Security Standards and Policies; Part 5: Cyber, Network, and Systems Forensics Security and Assurance; Part 6: Encryption Technology; Part 7: Privacy and Access Management; Part 8: Storage Security; Part 9: Cloud Security
|
505 |
0 |
|
|a Hire a Third Party to Audit SecurityDo Not Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Do Not Forget Paper!; 6. PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS; 7. SUMMARY; CHAPTER REVIEW QUESTIONS/EXERCISES; True/False; Multiple Choice; EXERCISE; Problem; Hands-on Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 3 -- A Cryptography Primer; 1. WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?
|
653 |
|
|
|a Computersicherheit / gnd
|
653 |
|
|
|a Rechnernetz / gnd / http://d-nb.info/gnd/4070085-9
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Tests d'intrusion
|
653 |
|
|
|a Penetration testing (Computer security) / fast
|
653 |
|
|
|a Datenschutz / gnd
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Datensicherung / gnd
|
653 |
|
|
|a Informationssystem / gnd / http://d-nb.info/gnd/4072806-7
|
653 |
|
|
|a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9780128038437
|
776 |
|
|
|z 0128038438
|
776 |
|
|
|z 0128039299
|
776 |
|
|
|z 9780128039298
|
776 |
|
|
|z 9780128039298
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128039298/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This comprehensive reference on computer security offers deep coverage of a wide range of issues in computer and cyber security theory, applications, and best practices.--
|