注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學技術(shù)計算機/網(wǎng)絡信息安全擊退黑客:IT安全非技術(shù)性指南

擊退黑客:IT安全非技術(shù)性指南

擊退黑客:IT安全非技術(shù)性指南

定 價:¥271.11

作 者: Robert Schifreen 著
出版社: John Wiley & Sons
叢編項:
標 簽: 暫缺

購買這本書可以去


ISBN: 9780470025550 出版時間: 2006-01-01 包裝: 精裝
開本: 頁數(shù): 字數(shù):  

內(nèi)容簡介

  The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue. Robert Schifreen, a self-confessed ex-hacker, made history in 1985 when he became the first person in the world to face a jury trial in connection with computer hacking. His subsequent acquittal in the High Court led to a change in UK Law and the introduction of the Computer Misuse Act 1990. His 20 years experience in IT security now lends itself to global radio and TV broadcasts, as well as appearances at conferences and lectures around the world. Keeping your company’s computers free from hackers, viruses, spammers, phishing attacks, social engineers and all the other things that can result in loss of data is a difficult job. Defeating the Hacker is a book about how to protect your computer systems becoming another victim of the hacker. It’s an instant primer into all the things that can go wrong, with advice on how to stop it happening or, if it’s too late, how to fix the damage. Presents unique, UK based, insider information on hacking and security from someone who has operated on both sides of the divide:Develops a populist seam within a hot IT area: security;Shows readers how and why hacking is made possible, whilst suggesting ways to avoid being a victim of it;Written in a dynamic, conversational, yet knowledgeable, style;Filled with information and anecdotal evidence aimed at IT professionals and those with a more general interest;Defeating the Hacker allows the reader to learn how to protect their computer systems with advice from someone who knows how to break into them.作者簡介:Robert Schifreen writes and speaks on IT security at seminars and conferences around the world, and has appeared on radio and TV as an expert spokesman around 100 times in the past 6 years.

作者簡介

暫缺《擊退黑客:IT安全非技術(shù)性指南》作者簡介

圖書目錄

Chapter 1: Introduction
Chapter 2: A Hacker is Made
Chapter 3: Preparation and Planning
Chapter 4: International Laws and Standards
Chapter 5: Passwords and Beyond
Chapter 6: Your Information Security Policy
Chapter 7: Security Awareness Training
Chapter 8: Patch Management
Chapter 9: Windows Workstation Security
Chapter 10: Basic Server Security
Chapter 11: Understanding Firewalls
Chapter 12: Protecting Your Web Site
Chapter 13: Wireless Networking
Chapter 14: Penetration Testing
Chapter 15: Security Through Obscurity
Chapter 16: Windows Vista
Chapter 17: Email
Chapter 18: The Curse of Spam
Chapter 19: Viruses
Chapter 20: Spyware, Adware and Rogue Diallers
Chapter 21: Piracy
Chapter 22: File Sharing and ‘P2P’
Chapter 23: Backups and Archives
Chapter 24: Preventing Internet Misuse
Chapter 25: Document Security
Chapter 26: Data Theft
Chapter 27: Encryption
Chapter 28: Employees’ Own Computers
Chapter 29: How Hackers Use Search Engines
Chapter 30: Denial of Service Attacks
Chapter 31: Provisioning and Identity Management
Chapter 32: Data Interception
Chapter 33: Out of the Office
Chapter 34: Social Engineering
Chapter 35: E-Commerce Fraud
Chapter 36: Intrusion Detection Systems
Chapter 37: Outsourcing
Chapter 38: Securing your Premises
Chapter 39: Forensics
Chapter 40: Planning for the Worst
Chapter 41: Hardware Theft
Chapter 42: Let’s Be Careful Out There
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號