Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers: PSI Business Security
Autor Philip Alexanderen Limba Engleză Hardback – 29 mar 2008 – vârsta până la 17 ani
Preț: 345.67 lei
Preț vechi: 476.25 lei
-27% Nou
Puncte Express: 519
Preț estimativ în valută:
66.16€ • 68.81$ • 55.44£
66.16€ • 68.81$ • 55.44£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780313345586
ISBN-10: 0313345589
Pagini: 188
Dimensiuni: 156 x 235 x 21 mm
Greutate: 0.45 kg
Editura: Bloomsbury Publishing
Colecția Praeger
Seria PSI Business Security
Locul publicării:New York, United States
ISBN-10: 0313345589
Pagini: 188
Dimensiuni: 156 x 235 x 21 mm
Greutate: 0.45 kg
Editura: Bloomsbury Publishing
Colecția Praeger
Seria PSI Business Security
Locul publicării:New York, United States
Notă biografică
Philip Alexander is Director of Security Operations for a fraud-management company. He began his career in computers back in the late 1980s while serving in the U.S. military. Since then, he has worked in both the public and private sectors in positions including engineer, principal security consultant, security architect, and information technology director. He holds numerous certifications, including the CISSP and ISSMP. Alexander has written numerous articles on data security issues, and he is the author of Data Breach Disclosure Laws: A State-by-State Perspective.
Cuprins
ACKNOWLEDGMENTSPREFACECOMPUTER USE AND DATA SECURITY POLICIES AND STANDARDSNETWORK/DMZ DESIGNDEFENSE IN DEPTHAUTHENTICATION AND AUTHORIZATIONSECURITY AND THE MOBILE EMPLOYEEBUSINESS CONTINUITY PLANNINGHACKERS, SNOOPS, AND VIRUSESPERSONNEL ISSUES AND HIRING PRACTICESCONTRACTUAL CONSIDERATIONSDATA PRIVACY LAWSOVERSEAS OUTSOURCINGAPPENDIX A: THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)APPENDIX B: RAINBOW SERIESAPPENDIX C: THE INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO)GLOSSARYINDEXABOUT THE AUTHOR
Recenzii
From issues of security policay standards, to network and DMZ design, to authentication and authorization, to security issues associated with mobile employees, hackers, snoops, viruses, data privacy laws, overseas outsourcing and more, Information Security is a complete instruction manual that is as informed as it is informative. Up-to-date, reader-friendly, and comprehensive, Information Security is strongly recommended reading for anyone with a management responsibility that includes data security and computer usage, as well as a core addition to professional, corporate, academic, and community library Computer Science & Security reference collections.