The Official HP Guides - Nancy Stevenson, Jan S. Smith, Mark L. Chambers

The Official HP Guides

Media-Kombination
1052 Seiten
2003
Prentice Hall
978-0-13-113296-2 (ISBN)
38,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Great Value--Three books in One! Quickly master Windows XP, burn killer DVDs and CDs, and easily create hundreds of printing projects on your HP Pavilion!
With three great books in one, you'll have everything you need to start having fun with your home computer. "HP Pavilion PCs Made Easy" includes everything you need to be productive, from opening the box and getting the computer set up, to exploring the pre-loaded software programs and the Windows XP computing environment. The HP Pavilion is the number one home computer with 3.6 million sold in 2001 and an even greater number projected for 2002. "Printing Projects Made Fun and Easy" brings to life hundreds of fun projects for home, holidays, families, sports, hobbies, cards and stationery, photos and crafts and more--all in four color! With the enclosed CD, you'll be making photo frames, greeting cards, and hundreds of other items with just a few clicks of a mouse, some paper, and a color printer. "Creating Your Own Great DVDs and CDs" fully explains each type of disc your DVD+RW drive can produce, and then illustrates the material with complete step-by-step projects that you can follow to record all sorts of discs. Also learn to create labels, on-disc menus, record CD slide shows with digital photographs, and troubleshoot common recording problems.

Mark L. Chambers has been a technical writer and PC/Mac hardware technician since 1989. Jan S. Smith is a senior communications specialist for the Imaging and Printing Group at Hewlett-Packard Company. In that role, she has produced dozens of award-winning multimedia videos, films, CDs and television programs. Nancy Stevenson has written over thirty books on technology and business topics. She has taught technical writing at the university level, and has been a corporate trainer working with computer learners ranging from beginner to advanced.

Prologue. Acknowledgments. 1. Introduction. The Security Mind. Where Do We Start? Where Does It End? 2. A New Look at Information Security. Security as an Art Form. What We Know About Security. Understanding the Fear Factor. How to Successfully Implement and Manage Security. 3. The Four Virtues of Security. Introduction to the Virtues. The Virtue of Daily Consideration. The Virtue of Community Effort. The Virtue of Higher Focus. The Virtue of Education. Using These Virtues. 4. The Eight Rules of Security (Components of All Security Decisions). Introduction to the Rules. Rule of Least Privilege. Rule of Change. Rule of Trust. Rule of the Weakest Link. Rule of Separation. Rule of the Three-Fold Process. Rule of Preventative Action (Proactive Security). Rule of Immediate and Proper Response. Incorporating the Rules. 5. Developing a Higher Security Mind. The Art of Higher Security. Thinking in Zones. Creating Chokepoints. Layering Security. Working in Stillness. Understanding Relational Security. Understanding Secretless Security. Dividing Responsibilities. Failing Securely. 6. Making Security Decisions. Using the Rules to Make a Decision. The Decision-Making Process. Example Decision. 7. Know Thy Enemy and Know Thyself. Understanding the Modern Hacker. Where Modern Vulnerabilities Exist. Modern Targets. Modern Exploits. Neglecting the Rules: A Hacker's Tale. Creating Your Own Security Profile. Becoming Invisible to Your Enemies. 8. Practical Security Assessments. The Importance of a Security Audit. Understanding Risks and Threats. The Traditional Security Assessment Model. The Relational Security Assessment Model. Relational Security Assessment Model: Risks. Relational Security Assessment Model: Controls. Relational Security Assessment Model: Tactical Audit Process. Analytical Audit Measures. Additional Audit Considerations. 9. The Security Staff. Building a Successful Security Team. Bringing in Security Consultants. Outsourcing Security Maintenance. 10. Modern Considerations. Using Standard Defenses. Open Source vs. Closed Source Security. Wireless Networks. Encryption. Virtual Private Networking. 11. The Rules in Practice. Practicing the Rules. Perimeter Defenses. Internal Defenses. Physical Defenses. Direct Object Defenses. Outbound Internet Access. Logging and Monitoring. Handling Authentication. 12. Going Forward. The Future of Information Security. Appendix A. Tips on Keeping Up-to-Date. Appendix B. Ideas for Training. Appendix C. Additional Recommended Audit Practices. Appendix D. Recommended Reading. Appendix E. The Hidden Statistics of Information Security. Index.

Erscheint lt. Verlag 16.6.2003
Verlagsort Upper Saddle River
Sprache englisch
Maße 175 x 235 mm
Gewicht 1483 g
Themenwelt Informatik Betriebssysteme / Server Windows
ISBN-10 0-13-113296-2 / 0131132962
ISBN-13 978-0-13-113296-2 / 9780131132962
Zustand Neuware
Haben Sie eine Frage zum Produkt?