Defeating the hacker : a non-technical guide to computer security by Robert Schifreen.

By: Schifreen, RobertMaterial type: TextTextPublication details: Chichester : John wiley And Sons Ltd. 2006Description: vi, 391 p. : ill ; 24cmISBN: 9780470025550 (hbk)Subject(s): Computer securityDDC classification: 005.8
Contents:
Introduction -- A hacker is made -- Preparation and Planning -- International Laws and Standards -- Passwords and Beyond -- Your Information Security Policy -- Security Awareness Training -- Patch Management -- Windows Workstation Security -- Basic Server Security -- Understanding Firewalls -- Protecting Your Web Site -- Wireless Networking -- Penetration Testing -- Security Through Obscurity -- Windows Vista -- Email -- The Curse of Spam -- Viruses -- Spyware, Adware and Rogue Diallers -- Piracy -- File Sharing and 'P2P' -- Backups and Archives -- Preventing Internet Misuse -- Document Security -- Data Theft -- Encryption -- Employees' Own Computers -- How Hackers Use Search Engines -- Denial of Service Attacks -- Provisioning and Identity Management -- Data Interception -- Out of the Office -- Social Engineering -- E-Commerce Fraud -- Intrusion Detection Systems -- Outsourcing -- Securing your Premises -- Forensics -- Planning for the Worst -- Hardware Theft -- Let's Be Careful Out There.
Summary: "This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employee's desks in the office and at home, and the servers which look after your company's email, file storage and Web site." --1st paragraph of introduction.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
005.8 SCH-D 2006 1509 (Browse shelf (Opens below)) Available 1509
Total holds: 0

Index included

Introduction -- A hacker is made -- Preparation and Planning -- International Laws and Standards -- Passwords and Beyond -- Your Information Security Policy -- Security Awareness Training -- Patch Management -- Windows Workstation Security -- Basic Server Security -- Understanding Firewalls -- Protecting Your Web Site -- Wireless Networking -- Penetration Testing -- Security Through Obscurity -- Windows Vista -- Email -- The Curse of Spam -- Viruses -- Spyware, Adware and Rogue Diallers -- Piracy -- File Sharing and 'P2P' -- Backups and Archives -- Preventing Internet Misuse -- Document Security -- Data Theft -- Encryption -- Employees' Own Computers -- How Hackers Use Search Engines -- Denial of Service Attacks -- Provisioning and Identity Management -- Data Interception -- Out of the Office -- Social Engineering -- E-Commerce Fraud -- Intrusion Detection Systems -- Outsourcing -- Securing your Premises -- Forensics -- Planning for the Worst -- Hardware Theft -- Let's Be Careful Out There.

"This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employee's desks in the office and at home, and the servers which look after your company's email, file storage and Web site." --1st paragraph of introduction.

There are no comments on this title.

to post a comment.