Access Denied: The Complete Guide to Protecting Your Business Online
Seiten
2001
McGraw-Hill Professional (Verlag)
978-0-07-213368-4 (ISBN)
McGraw-Hill Professional (Verlag)
978-0-07-213368-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This title provides a guide aimed at a non-technical audience and action orientated advice for securing computer systems. Using information in this book, managers should be able to understand their company's risks to email, eCommerce, Websites, data and computer systems.
Learn to protect your online business using this insightful and practical guide to computer security. Through use of real examples, you'll understand and address the risks associated with using email, Web sites, e-commerce, portable devices, networks, and computer systems. This guide explains how to prepare for and prevent computer security problems as well as the best means of responding to and recovering from attacks. Also, you'll get details on the different types of viruses, the damage they can cause, and what type of virus protection tools to use.
Learn to protect your online business using this insightful and practical guide to computer security. Through use of real examples, you'll understand and address the risks associated with using email, Web sites, e-commerce, portable devices, networks, and computer systems. This guide explains how to prepare for and prevent computer security problems as well as the best means of responding to and recovering from attacks. Also, you'll get details on the different types of viruses, the damage they can cause, and what type of virus protection tools to use.
Cathy Cronkhite (San Diego, CA) is the Manager of Client Operations, San Diego, for Xerox Connect. As a systems integrator, her expertise includes security evaluations and implementations. She is an accomplished public speaker and instructor.
1: Understanding Hackers and How They Attack 2: Viruses, Hoaxes, and Other Computer Pests 3: Keeping Electronic Mail Under Control 4: Web Site and E-commerce Security Issues 5: Encryption Types and Their Appropriate Use 6: Protecting Information from Loss, Fraud and Theft 7: Network Security Weaknesses 8: Limiting Physical Access to Computer Systems 9: Remote Computing Concerns 10: Responding to Attacks 11: Establishing Safe Business Practices A: Web Resources B: Forms and Templates Glossary
Erscheint lt. Verlag | 16.8.2001 |
---|---|
Zusatzinfo | illustrations |
Sprache | englisch |
Maße | 155 x 229 mm |
Gewicht | 590 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-07-213368-6 / 0072133686 |
ISBN-13 | 978-0-07-213368-4 / 9780072133684 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €