Information security best practices: 205 basic rules
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules&...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston [Mass.]
Butterworth-Heinemann
© 2002
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xii, 194 pages) illustrations |
ISBN: | 9781878707963 1878707965 0080491545 9780080491547 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124483 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2002 |||| o||u| ||||||eng d | ||
020 | |a 9781878707963 |9 978-1-878707-96-3 | ||
020 | |a 1878707965 |9 1-878707-96-5 | ||
020 | |a 0080491545 |9 0-08-049154-5 | ||
020 | |a 9780080491547 |9 978-0-08-049154-7 | ||
035 | |a (ZDB-33-ESD)ocn162598024 | ||
035 | |a (OCoLC)162598024 | ||
035 | |a (DE-599)BVBBV046124483 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Stefanek, George L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security best practices |b 205 basic rules |c by George L. Stefanek |
264 | 1 | |a Boston [Mass.] |b Butterworth-Heinemann |c © 2002 | |
300 | |a 1 online resource (xii, 194 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781878707963 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504937 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781878707963 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442552729600 |
---|---|
any_adam_object | |
author | Stefanek, George L. |
author_facet | Stefanek, George L. |
author_role | aut |
author_sort | Stefanek, George L. |
author_variant | g l s gl gls |
building | Verbundindex |
bvnumber | BV046124483 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162598024 (OCoLC)162598024 (DE-599)BVBBV046124483 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03236nmm a2200409zc 4500</leader><controlfield tag="001">BV046124483</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781878707963</subfield><subfield code="9">978-1-878707-96-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1878707965</subfield><subfield code="9">1-878707-96-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080491545</subfield><subfield code="9">0-08-049154-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080491547</subfield><subfield code="9">978-0-08-049154-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162598024</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162598024</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124483</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stefanek, George L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security best practices</subfield><subfield code="b">205 basic rules</subfield><subfield code="c">by George L. Stefanek</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [Mass.]</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">© 2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 194 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781878707963</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504937</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781878707963</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124483 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781878707963 1878707965 0080491545 9780080491547 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504937 |
oclc_num | 162598024 |
open_access_boolean | |
physical | 1 online resource (xii, 194 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Stefanek, George L. Verfasser aut Information security best practices 205 basic rules by George L. Stefanek Boston [Mass.] Butterworth-Heinemann © 2002 1 online resource (xii, 194 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment. * Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network * Accompanying CD includes an electronic version of the book Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures http://www.sciencedirect.com/science/book/9781878707963 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Stefanek, George L. Information security best practices 205 basic rules Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Information security best practices 205 basic rules |
title_auth | Information security best practices 205 basic rules |
title_exact_search | Information security best practices 205 basic rules |
title_full | Information security best practices 205 basic rules by George L. Stefanek |
title_fullStr | Information security best practices 205 basic rules by George L. Stefanek |
title_full_unstemmed | Information security best practices 205 basic rules by George L. Stefanek |
title_short | Information security best practices |
title_sort | information security best practices 205 basic rules |
title_sub | 205 basic rules |
topic | Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | Computer networks / Security measures Computer security Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781878707963 |
work_keys_str_mv | AT stefanekgeorgel informationsecuritybestpractices205basicrules |