The Secured Enterprise: Protecting Your Information Assets

Paul E. Proctor, F. Christian Byrnes

  • 出版商: Prentice Hall
  • 出版日期: 2002-02-28
  • 售價: $1,510
  • 貴賓價: 9.5$1,435
  • 語言: 英文
  • 頁數: 336
  • 裝訂: Paperback
  • ISBN: 013061906X
  • ISBN-13: 9780130619068
  • 已過版

買這商品的人也買了...

商品描述

Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE critical issue for business decision-makers in this era of hackers and potential cyberterrorism. But until now, most books on information security have been written for programmers and networking professionals, not business people. The Secured Enterprise: Protecting Your Information Assets fills the gap, delivering a non-technical, business-focused briefing on every key aspect of information security: frompeople to process to technology.

  • A guide to today's security threats—including cyberterrorism
  • How to establish effective, realistic security policies
  • The tools for defending your information assets
  • Effective mechanisms for identification, authentication, and access control
  • What firewalls can—and cannot—do
  • Vulnerability scanners, virus detectors, and intrusion detection systems
  • Virtual private networks: leveraging the cost savings without exposing your data to risk
  • Securing B2B and B2C e-commerce
  • How to evaluate third-party security products and services
  • New security options for wireless applications
Security has gotten more complex with time, and it has become more difficult to distill it. After reading this book you will understand security better and be more prepared to apply it in your enterprise.

—Jeff Moss,
Founder, DEF CON President,
Black Hat, Inc

Table of Contents

Foreword.
Acknowledgments.
Introduction: How to Read This Book.

I. INTRODUCTION TO SECURITY.

1. Introduction to Security.
2. Threat Briefing.
3. Security Policies.
4. Authentication, Authorization, Access Control.

II. SECURITY TECHNOLOGIES.


5. Firewalls.
6. Vulnerability Scanners.
7. Virus Detection and Content Filters.
8. Intrusion Detection.
9. Public Key Infrastructure and Encryption.
10. Encrypted Communications.
11. Mobile Workers and Wireless LANs.
12. Single Signon.
13. Digital Signatures and Electronic Commerce.

III. IMPLEMENTATION.


14. Establishing a Security Program.
15. Security Assessments.
16. Managed Security Services.
17. Response and Recovery.
18. Implementing Web and Internet Security.

IV. ODDS AND ENDS.


19. Legal Issues.
20. Putting It All Together.
Glossary.
Index.