000 01159nam a2200181Ia 4500
999 _c11893
_d11893
005 20200617083605.0
008 180702s9999 xx 000 0 und d
020 _a9781878707963
040 _cPK-IsLIS
082 _a005.8
_bS816
100 _aStefanek, George L.
245 _aInformation security best practices : 205 basic rules
_c/ George L. Stefanek
260 _bButterworth Heinemann,
_aBoston :
_c2002
300 _axii, 194 p.
650 _aComputer science-Computer security
942 _cBK
505 0 _ainformation security attacks and vulnerabilities; anatomy of an attack; awareness and management commitment to security; security policy; INFOSEC network architecture design rules; rules for selecting security hardware and software; physical security rules; network hardware security; operating system security rules; PC operating system security rules; internet security rules; application security rules; software validation and verification rules; data encryption rules; configuration management rules; network monitoring rules; maintenance and troubleshooting security rules; training; emergency rules against attacks