Vista normal Vista MARC Vista ISBD

The little black book of computer security / Joel Dubin

Por: Dubin, Joel.
Tipo de material: materialTypeLabelLibroEditor: Loveland : Penton, 2008Edición: 2ª edición.Descripción: 204 páginas : ilustraciones.ISBN: 978-1-58304-150-5.Tema(s): Seguridad en computadores | Delitos por computador | Protección de datos | Privacidad de los datos | Internet (Red de computadores) | Virus informáticos | Cifras y clavesClasificación CDD: 005.8 D814L 2008
Contenidos:
• What’s new in the second edition -- VII • Chapter 1. Why read this book? -- 1 • Chapter 2. Grouping attacks into families -- 7 • Chapter 3. Assessing your system -- 11 • Chapter 4. Writing your security policy -- 19 • Chapter 5. Taking care of physical security -- 29 • Chapter 6. Managing human resources • Chapter 7. Putting software access controls in place -- 47 • Chapter 8. Securing E-mail -- 59 • Chapter 9. Protecting your system against viruses, trojans, worms, and rootkits -- 71 • Chapter 10. Securing your web site -- 79 • Chapter 11. Defending your network perimeter and endpoints -- 93 • Chapter 12. Detecting intrusions -- 109 • Chapter 13. Responding to incidents -- 125 • Chapter 14. Recovering from disasters -- 137 • Chapter 15. Securing your wireless network -- 141 • Chapter 16. Writing secure programming code -- 145 • Chapter 17. Securing your infrastructure: Windows, UNIX, and linux -- 153 • Chapter 18. protecting privacy, preventing identity theft, and protecting children -- 167 • Chapter 19. Working with compliance auditors and regulators -- 173 • Chapter 20. Implementing a security-awareness training program -- 179 • Chapter 21. Entertaining a few words about encryption -- 183 • Chapter 22. Taking a look at future trends -- 181 • Appendix A). Short cheat sheet for computer security -- 195 • Appendix B). Web sites to check daily -- 201 • Appendix C). Tools of the trade -- 203 • Appendix D). Common TCP ports -- 205 • Appendix E). The ten commandments of computer security -- 207
Tipo de ítem Biblioteca de origen Colección Signatura Copia número Estado Fecha de vencimiento Código de barras Reserva de ejemplares
Libro (Col. General) Libro (Col. General) Campus I
Colección General 005.8 D814L 2008 (Navegar estantería) Ej. 1 Disponible 090467
Libro (Col. General) Libro (Col. General) Campus I
Colección General 005.8 D814L 2008 (Navegar estantería) Ej. 2 Disponible 090468
Reservas Totales: 0

CAMPUS I

• What’s new in the second edition -- VII
• Chapter 1. Why read this book? -- 1
• Chapter 2. Grouping attacks into families -- 7
• Chapter 3. Assessing your system -- 11
• Chapter 4. Writing your security policy -- 19
• Chapter 5. Taking care of physical security -- 29
• Chapter 6. Managing human resources
• Chapter 7. Putting software access controls in place -- 47
• Chapter 8. Securing E-mail -- 59
• Chapter 9. Protecting your system against viruses, trojans, worms, and rootkits -- 71
• Chapter 10. Securing your web site -- 79
• Chapter 11. Defending your network perimeter and endpoints -- 93
• Chapter 12. Detecting intrusions -- 109
• Chapter 13. Responding to incidents -- 125
• Chapter 14. Recovering from disasters -- 137
• Chapter 15. Securing your wireless network -- 141
• Chapter 16. Writing secure programming code -- 145
• Chapter 17. Securing your infrastructure: Windows, UNIX, and linux -- 153
• Chapter 18. protecting privacy, preventing identity theft, and protecting children -- 167
• Chapter 19. Working with compliance auditors and regulators -- 173
• Chapter 20. Implementing a security-awareness training program -- 179
• Chapter 21. Entertaining a few words about encryption -- 183
• Chapter 22. Taking a look at future trends -- 181
• Appendix A). Short cheat sheet for computer security -- 195
• Appendix B). Web sites to check daily -- 201
• Appendix C). Tools of the trade -- 203
• Appendix D). Common TCP ports -- 205
• Appendix E). The ten commandments of computer security -- 207