You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Security issues are at an all-time high. This volume provides updated, comprehensive, platform-by-platform coverage of security issues, and includes to-the-point descriptions of techniques hackers use to penetrate systems. This book provides information for security administrators interested in computer and network security and provides techniques to protect their systems.
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter of success or failure for big business.* This groundbreaking book takes on the difficult ethical issues that IT professional confront every day.* The book provides clear guidelines that can be readily translated into policies and procedures.* This is not a text book. Rather, it provides specific guidelines to System Administrators, Security Consultants and Programmers on how to apply ethical standards to day-to-day operations.
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...
This edition of "Security Complete" is the ultimate resource, including new coverage of firewalls, Cisco PIX, wireless networks, and Windows XP. Every business needs a secure network to share information, computer resources, and Internet access this volume provides users with the information they need to ensure that their data is safe and secure.
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare ...
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud su...
Do you need a one-volume lesson about business applications of the Internet and other computer-based hardware and software? This book provides comprehensive coverage of four major areas: The Internet and Data Communications Basics, Popular Types of Networks, Design, Implementation, and Management Issues in a Network Environment, and Data Communication and Internet Applications. The Handbook of Business Data Communications looks briefly at the major corporations working in each category. In addition to practical examples, short case studies, and summaries of emerging issues in data communications, Professor Bidgoli discusses personal, social, organizational, and legal issues surrounding the u...
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer. Includes strategy for securely implementing network po...
Targeted at programmers developing with Active Directory and Active Server Pages, this preview book enables consultants, administrators, and managers to evaluate Active Directory before Windows NT 5 is released.
This updated bestseller features new, more focused review material for the leading computer security certification-the Certified Information Systems Security Professional, or CISSP The first book on the market to offer comprehensive review material for the Information Systems Security Engineering Professional (ISSEP) subject concentration, a new CISSP credential that's now required for employees and contractors of the National Security Agency (NSA) and will likely be adopted soon by the FBI, CIA, Department of Defense, and Homeland Security Department The number of CISSPs is expected to grow by fifty percent in 2004 The CD-ROM includes the Boson-powered interactive test engine practice sets for CISSP and ISSEP