Information Security Best Practices: 205 Basic Rules

4 avg rating
( 1 ratings by Goodreads )
 
9781878707963: Information Security Best Practices: 205 Basic Rules
View all copies of this ISBN edition:
 
 

Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security. Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.

* Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network

"synopsis" may belong to another edition of this title.

From the Publisher:

Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.

About the Author:

George L. Stefanek, Ph.D., has over 18 years of experience as a systems administrator and manager of IS/IT departments. He has also consulted on information security issues for such clients as the U.S. Department of Defense.

"About this title" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

Stefanek, George L
Published by Butterworth-Heinemann (2002)
ISBN 10: 1878707965 ISBN 13: 9781878707963
New Paperback Quantity Available: 1
Seller:
Murray Media
(North Miami Beach, FL, U.S.A.)
Rating
[?]

Book Description Butterworth-Heinemann, 2002. Paperback. Condition: New. Never used!. Seller Inventory # P111878707965

More information about this seller | Contact this seller

Buy New
US$ 52.74
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds

2.

George L Stefanek
Published by Butterworth-Heinemann (2002)
ISBN 10: 1878707965 ISBN 13: 9781878707963
New Softcover Quantity Available: 1
Seller:
Irish Booksellers
(Portland, ME, U.S.A.)
Rating
[?]

Book Description Butterworth-Heinemann, 2002. Condition: New. book. Seller Inventory # M1878707965

More information about this seller | Contact this seller

Buy New
US$ 81.19
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds