Information security best practices : 205 basic rules / George L. Stefanek
Material type: TextPublication details: Butterworth Heinemann, Boston : 2002Description: xii, 194 pISBN:- 9781878707963
- 005.8 S816
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | UE-Central Library | 005.8 S816 (Browse shelf(Opens below)) | Available | T10414 | ||
Books | UE-Central Library | 005.8 S816 (Browse shelf(Opens below)) | Available | T10413 |
Browsing UE-Central Library shelves Close shelf browser (Hides shelf browser)
005.8 S2831 Hacking exposed : | 005.8 S3921 Security patterns : | 005.8 S816 Information security best practices : 205 basic rules | 005.8 S816 Information security best practices : 205 basic rules | 005.8 So558 Cryptography and network security : principles and practice | 005.8 So558 Cryptography and network security : principles and practice | 005.8 So558 Cryptography and network security : principles and practice |
information security attacks and vulnerabilities;
anatomy of an attack;
awareness and management commitment to security;
security policy;
INFOSEC network architecture design rules;
rules for selecting security hardware and software;
physical security rules;
network hardware security;
operating system security rules;
PC operating system security rules;
internet security rules;
application security rules;
software validation and verification rules;
data encryption rules;
configuration management rules;
network monitoring rules;
maintenance and troubleshooting security rules;
training;
emergency rules against attacks
There are no comments on this title.