Information security best practices : 205 basic rules
/ George L. Stefanek
- Boston : Butterworth Heinemann, 2002
- xii, 194 p.
information security attacks and vulnerabilities; anatomy of an attack; awareness and management commitment to security; security policy; INFOSEC network architecture design rules; rules for selecting security hardware and software; physical security rules; network hardware security; operating system security rules; PC operating system security rules; internet security rules; application security rules; software validation and verification rules; data encryption rules; configuration management rules; network monitoring rules; maintenance and troubleshooting security rules; training; emergency rules against attacks