Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander.

By: Alexander, Philip, 1963-.
Material type: TextTextSeries: PSI business security: Publisher: Westport, Conn. : Praeger Security International, 2008Description: 1 online resource (viii, 175 p.).ISBN: 9780313345593 (electronic bk.); 0313345597 (electronic bk.).Subject(s): Business enterprises -- Computer networks -- Security measures | Information technology -- Security measures | Computer security | Data protection | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: Information security.DDC classification: 005.8 Online resources: EBSCOhost
Contents:
Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
Summary: In this book the author provides a broad guide to understanding data security, related technologies and what they can and cannot do, and other issues pertaining to protecting a company's vital and confidential information from loss or exposure. Topics include Defense in Depth (layered defense), security and mobile employees, personnel issues and hiring practices, overseas outsourcing, and hackers and viruses. This book is intended for non-technical executives responsible for maintaining information security.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes index, appendix, and glossary.

Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.

Includes bibliographical references.

In this book the author provides a broad guide to understanding data security, related technologies and what they can and cannot do, and other issues pertaining to protecting a company's vital and confidential information from loss or exposure. Topics include Defense in Depth (layered defense), security and mobile employees, personnel issues and hiring practices, overseas outsourcing, and hackers and viruses. This book is intended for non-technical executives responsible for maintaining information security.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Information security by Alexander, Philip, ©2008
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter