Computer Insecurity (eBook)

Risking the System
eBook Download: PDF
2007 | 2005
XIII, 240 Seiten
Springer London (Verlag)
978-1-84628-270-6 (ISBN)

Lese- und Medienproben

Computer Insecurity - Steven M. Furnell
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Written specifically for business managers.

Emphasizes issues over technology.



Dr. Steven Furnell is a reader in information systems security at the University of Plymouth, and has already published one book: 'Cybercrime: Vandalising The Information Society', Paperback: 336 pages ; Publisher: Addison-Wesley Pub Co; 1st edition (December 21, 2001), ISBN: 0201721597.

Aside from the assigned reviewers and a number of Dr Furnell's academic colleagues, the manuscript has also been read by Dr Jeremy Ward, Service Development Director of for Symantec UK, who provided summary feedback describing it as 'really excellent'.


Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincingly illustrated that the problem is increasing in both scale and cost.Computer Insecurity: Risking the System approaches its topic from the perspective of vulnerability - how can your system be attacked? Covering technical issues and human factors, the comprehensively researched text makes reference to numerous real-life security incidents, which help to provide persuasive practical evidence of the problems and the impacts that result.Key issues covered include:the problem of computer insecurity the need to raise security awareness common failings that compromise protection the attack and exploitation of systems considerations in responding to the threats Presented in clear and lucid terms, the discussion is invaluable reading for all business and computing professionals who wish for an overview of the issues rather than a shopping list of the security measures available. 'In today's connected world no-one can afford to ignore computer security, this book tells you why, and what you should do about it, in simple non-technical language.'Dr Jeremy Ward, Director of Service Development, Symantec (UK) Ltd'Computer Insecurity contains loads of practical advice supported by an abundance of real world examples and research. If you don't understand what all the fuss concerning computer security is about then this book was written for you.'Jeff Crume, CISSPExecutive IT Security Architect, IBM and author of 'Inside Internet Security - What hackers don't want you to know''I have long been looking for a book that would give answers to why rather than how we cater for Information and Communication Systems Security ... I recommend it wholeheartedly to anyone that wishes to extend their knowledge'Professor Sokratis K. Katsikas, University of the Aegean, Greece

Dr. Steven Furnell is a reader in information systems security at the University of Plymouth, and has already published one book: "Cybercrime: Vandalising The Information Society", Paperback: 336 pages ; Publisher: Addison-Wesley Pub Co; 1st edition (December 21, 2001), ISBN: 0201721597. Aside from the assigned reviewers and a number of Dr Furnell’s academic colleagues, the manuscript has also been read by Dr Jeremy Ward, Service Development Director of for Symantec UK, who provided summary feedback describing it as "really excellent".

The problem of IT insecurity The need to raise awareness Common failings that compromise security The widespread nature of vulnerability Attack and exploitation of IT systems Responses from the security industry Final thoughts

Erscheint lt. Verlag 6.3.2007
Zusatzinfo XIII, 240 p. 30 illus.
Verlagsort London
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
Schlagworte computer crime • Computer Security • IT Security • Management (of Systems) • risk assessment • security • Security assurance
ISBN-10 1-84628-270-5 / 1846282705
ISBN-13 978-1-84628-270-6 / 9781846282706
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 58,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99