RSA Press -- RSA is the leading developer of data encryption and cryptography in the US. RSA is synonomous with Security and encryption.
-- Advice from the pros -- This is the book that discusses how attacks occur and how to stop them before they occur! This is of interest to not only the network adminsitrator, but the CIO, LAN Manager, and anyone with valuable data on a network. This is critical information considering:
-- IDC analyst found most attacks (70% !) come from within the company or organization, not from industrial thieves or political activists.
-- No Data is Safe! Everyone from the New York Times, the US Senate, and Large ISP's, to Fortune 500 corporations and even the FBI. 50% of all networks get attacked by hackers (Source: IDC).
-- Administrators usually don't even know they are under attack! Less the 3% of all hacker attacks are even detected and less than 1% are ever reported to the FBI (Source: ComputerWorld Magazine).
"synopsis" may belong to another edition of this title.
Computer security holds a unique position among information technology disciplines. Because threats to systems are so numerous and varied, you can spend years studying them (and general strategies for counteracting them) before you start to work with specific security tools. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves is a guide to computer security that remains one step back from security software itself. In place of specific how-to information, readers learn about the motives of online attackers and the strategies they use to gain unauthorized access to systems and data, plus overarching concepts like public-key cryptography. They also find out about defensive and forensic strategies for preventing attacks and limiting their potency when they occur.
The authors of this book--a cryptographer, a couple of mathematicians, and a handful of others--employ a very text-heavy presentation style that's best suited to attentive study. The prose tends to be dense and a bit academic, and certain conceptual diagrams approach inscrutability. Still, security is a complicated matter, and a simplistic treatment wouldn't be as useful. It's possible to scan the index for a topic that interests you--keystroke biometrics, say--and find a definition and a statement of pros and cons. You'll also find endnote references to more specialized works but little mention of software products that implement the ideas the authors explain. --David Wall
Topics covered: Computer and network security, including risk management, security policy, cryptography, access control, authentication, biometrics, actions to be taken during an attack, and case studies of hacking and information warfare.From the Back Cover:
Learn to stop digital espionage--before it happens!
Network data has become increasingly valuable in today's public and private sectors. But exactly how safe is the information that's accessible from a network? According to the expert authors of Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves, NO data is safe. In fact, digital espionage, theft and destruction occur every day, and most attacks go undetected until it's too late. This groundbreaking new work discusses the growing vulnerabilities and the importance of protecting digital information. It explains how and why attacks occur and shows you how to prevent and detect future attacks.
Key features include:Real-world case studies that show how attacks have been carried out How to evaluate a network for security holes and how to plug them How to detect and react when a network is under attack Evaluation of commercially available virtual private networks Approach to network security that takes business practices into account
This book offers what no other book can: a guide to defending your digital assets against all manner of threats, whatever their motivation or source. The ideas and strategies contained in this book are essential to anyone managing valuable data on a network.
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Companies, 2000. Paperback. Book Condition: New. Bookseller Inventory # DADAX0072122854
Book Description McGraw-Hill Companies, 2000. Paperback. Book Condition: New. Bookseller Inventory # P110072122854
Book Description McGraw-Hill Companies. PAPERBACK. Book Condition: New. 0072122854 New Condition. Bookseller Inventory # NEW6.1032639
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800721228551.0