Surviving Security: How to Integrate People, Process, and TechnologyCRC Press, 18 dec 2003 - 528 pagina's Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that conside |
Overige edities - Alles bekijken
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Gedeeltelijke weergave - 2003 |
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Gedeeltelijke weergave - 2003 |
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Geen voorbeeld beschikbaar - 2003 |
Veelvoorkomende woorden en zinsdelen
Additionally administrators analyze Anson Inc anti-virus applications architecture authentication buffer overflow changes Chapter client communications compromised configuration connection corporate network cost database denial-of-service attacks detection developed devices digital certificates digital signatures discussed e-mail employees encryption ensure environment Exhibit exploits files firewall functionality hacker host identify IDSs implement incident installed internal network Internet intrusion intrusion-detection system IP addresses IPSec issues layer Linux login malicious Microsoft monitoring operating system organization password patches perimeter port procedures programs protect Protocol proxy server public key remote access require risk router running scan scanners screening router scripts SecurID security infrastructure security policy sendmail signature smart cards SNMP solution Switch telnet threat traffic unauthorized updates vendors vulnerability assessment Web server Windows Windows NT Workstation