Gupta A., Laliberte S. - Defend I.T. Security by Example [2004, CHM, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
1 0 1.33 МБ
Аватара пользователя
Сообщения: 25933
Зарегистрирован: 05 ноя 2011, 22:02

Gupta A., Laliberte S. - Defend I.T. Security by Example [2004, CHM, ENG]

Сообщение Nik » 27 дек 2013, 22:54

Defend I.T. Security by Example

Год: 2004
Автор: Ajay Gupta, Scott Laliberte
Жанр: Практическое пособие
Издательство: Addison Wesley, Pearson Education
ISBN: 0-321-19767-4
Язык: Английский
Формат: CHM
Качество: Изначально компьютерное (eBook)
Количество страниц: 384

Описание: What does a cyber security professional do? This is a question often posed by individuals who have heard a lot about security—especially the need to secure their electronic assets—but who are not entirely clear on what is involved. Cyber security involves a variety of things. Although we, the cyber security professionals, understand the various aspects of our jobs, it is often difficult to explain to people outside the profession (even our spouses) what exactly we do, and what exactly needs to be done to secure electronic assets.

The details of many professions are difficult to describe, so examples often offer the best means of explanation. Security is no different. In this book we hope to provide some insight into cyber security by using case studies to describe what a cyber security professional does.

We hope that this collection of case studies will serve as a tour of many of the issues that cyber security professionals face, not only in their careers but in their day-to-day lives.

One of the goals of this book, then, is to explain what we do; but there are other, more critical goals as well. Our primary aim is to provide practical examples of the types of issues that security professionals must be prepared to face in the execution of their duties.
Примеры страниц
Part I: Basic Hacking
Chapter 1. Getting to Know the Enemy: Nmap the Target Network
Chapter 2. Home Architecture
Chapter 3. No Service for You!
Part II: Current Methods
Chapter 4. Look. Ma. No Wires!
Chapter 5. Virus Outbreak I
Chapter 6. Virus Outbreak II: The Worm
Chapter 7. Changing Face
Part III: Additional Kerns on the Plate
Chapter 8. Protecting Borders: Perimeter Defense with an IDS
Chapter 9. Disaster All Around
Chapter 10. Security Is the Best Policy
Chapter 11. HIPAA: Security by Regulation
Part IV: Old School
Chapter 12. A War-Dialing Attack
Chapter 13. A Low-Tech Path into the High-Tech World
Part V: Computer Forensics
Chapter 14. Industrial Espionage
Chapter 15. Executive Fraud
Chapter 16. Cyber Extortion
Appendix. Conclusion
Appendix. Recommended Reading

Опубликовано группой
У вас нет необходимых прав для просмотра вложений в этом сообщении.