買這商品的人也買了...
-
$680$578 -
$650$553 -
$980$774 -
$520$406 -
$960$912 -
$680$646 -
$1,920$1,824 -
$690$587 -
$590$466 -
$680$537 -
$750$638 -
$560$476 -
$2,370$2,252 -
$480$379 -
$780$616 -
$490$382 -
$780$663 -
$580$452 -
$1,452Classic Shell Scripting (Paperback)
-
$880$695 -
$550$468 -
$580$493 -
$580$458 -
$580$493 -
$650$507
相關主題
商品描述
Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fourth Edition continues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions you can take to eliminate them.
The collected chapters are written by renowned industry professionals. Requiring minimal technical knowledge to understand, covered topics include: foundations of computer security, threats and vulnerabilities, prevention (technical defenses and human factors), detection, remediation, management’s role, and other considerations such as using encryption internationally, anonymity and identity in cyberspace, and censorship.
Protect the information and networks that are vital to your organization with Computer Security Handbook, Fourth Edition.
Table of Contents
PART ONE: FOUNDATIONS OF COMPUTER SECURITY.
Brief History and Mission of Information System Security (S. Bosworth & R. Jacobson).
Cyberspace Law and Computer Forensics (R. Heverly & M. Wright).
Using a "Common Language" for Computer Security Incident Information (J. Howard & P. Meunier).
Studies and Surveys of Computer Crime (M. Kabay).
Toward a New Framework for Information Security (D. Parker).
PART TWO: THREATS AND VULNERABILITIES.
The Psychology of Computer Criminals (Q. Campbell & D. Kennedy).
Information Warfare (S. Bosworth).
Penetrating Computer Systems and Networks (C. Cobb, et al.).
Malicious Code (R. Thompson).
Mobile Code (R. Gezelter).
Denial of Service Attacks (D. Levine & G. Kessler).
The Legal Framework for Protecting Intellectual Property in the Field of Computing and Computer Software (W. Zucker & S. Nathan).
E-Commerce Vulnerabilities (A. Ghosh).
Physical Threats to the Information Infrastructure (F. Platt).
PART THREE: PREVENTION: TECHNICAL DEFENSES.
Protecting the Information Infrastructure (F. Platt).
Identification and Authentication (R. Sandhu).
Operating System Security (W. Stallings).
Local Area Networks (G. Kessler & N. Pritsky).
E-Commerce Safeguards (J. Ritter & M. Money).
Firewalls and Proxy Servers (D. Brussin).
Protecting Internet-Visible Systems (R. Gezelter).
Protecting Web Sites (R. Gezelter).
Public Key Infrastructures and Certificate Authorities (S. Chokhani).
Antivirus Technology (C. Cobb).
Software Development and Quality Assurance (D. Levine).
Piracy and Antipiracy Techniques (D. Levine).
PART FOUR: PREVENTION: HUMAN FACTORS.
Standards for Security Products (P. Brusil & N. Zakin).
Security Policy Guidelines (M. Kabay).
Security Awareness (K. Rudolph, et al.).
Ethical Decision Making and High Technology (J. Linderman).
Employment Practices and Policies (M. Kabay).
Operations Security and Production Controls (M. Walsh & M. Kabay).
E-Mail and Internet Use Policies (M. Kabay).
Working with Law Enforcement (M. Wright).
Using Social Psychology to Implement Security Policies (M. Kabay).
Auditing Computer Security (D. Levine).
PART FIVE: DETECTION.
Vulnerability Assessment and Intrusion Detection Systems (R. Bace).
Monitoring and Control Systems (D. Levine).
Application Controls (M. Walsh).
PART SIX: REMEDIATION.
Computer Emergency Quick-Response Teams (B. Cowens & M. Miora).
Data Backups and Archives (M. Kabay).
Business Continuity Planning (M. Miora).
Disaster Recovery (M. Miora).
Insurance Relief (R. Parisi, Jr.).
PART SEVEN: MANAGEMENT'S ROLE.
Management Responsibilities and Liabilities (C. Hallberg, et al.).
Developing Security Policies (M. Kabay).
Risk Assessment and Risk Management (R. Jacobson).
Y2K: Lessons Learned for Computer Security (T. Braithwaite).
PART EIGHT: OTHER CONSIDERATIONS.
Medical Records Security (P. Brusil & D. Harley).
Using Encryption Internationally (D. Levine).
Censorship and Content Filtering (L. Tien & S. Finkelstein).
Privacy in Cyberspace (B. Hayes, et al.).
Anoymity and Identity in Cyberspace (M. Kabay).
The Future of Information Security (P. Tippett).
Index.
商品描述(中文翻譯)
電腦安全的權威公式,從停電到盜竊和破壞
無論您是負責多台電腦,還是僅僅一台重要的電腦,您都可以立即採取措施來保護您公司的電腦系統及其內容。《電腦安全手冊》提供了一個可讀且全面的資源,用於保護大型電腦系統和個人電腦網絡。本書的第四版延續了維護高度受尊重的行業指導方針的悠久傳統,旨在檢測幾乎所有可能對您的系統構成威脅的情況,並規定您可以採取的具體行動來消除這些威脅。
所收錄的章節由知名行業專業人士撰寫。理解所涵蓋的主題所需的技術知識最少,包括:電腦安全的基礎、威脅與漏洞、預防(技術防禦和人為因素)、檢測、修復、管理的角色,以及其他考量,例如國際加密的使用、網路空間中的匿名性和身份、以及審查制度。
使用《電腦安全手冊》第四版來保護對您的組織至關重要的信息和網絡。
目錄
第一部分:電腦安全的基礎。
信息系統安全的簡史與使命(S. Bosworth & R. Jacobson)。
網路空間法律與電腦取證(R. Heverly & M. Wright)。
使用「共同語言」來處理電腦安全事件信息(J. Howard & P. Meunier)。
電腦犯罪的研究與調查(M. Kabay)。
邁向信息安全的新框架(D. Parker)。
第二部分:威脅與漏洞。
電腦犯罪者的心理學(Q. Campbell & D. Kennedy)。
信息戰(S. Bosworth)。
滲透電腦系統和網絡(C. Cobb 等)。
惡意代碼(R. Thompson)。
移動代碼(R. Gezelter)。
拒絕服務攻擊(D. Levine & G. Kessler)。
保護計算和計算機軟件領域知識產權的法律框架(W. Zucker & S. Nathan)。
電子商務漏洞(A. Ghosh)。
對信息基礎設施的物理威脅(F. Platt)。
第三部分:預防:技術防禦。
保護信息基礎設施(F. Platt)。
身份識別與認證(R. Sandhu)。
操作系統安全(W. Stallings)。
局域網(G. Kessler & N. Pritsky)。
電子商務保障措施(J. Ritter & M. Money)。
防火牆和代理伺服器(D. Brussin)。
保護互聯網可見系統(R. Gezelter)。
保護網站(R. Gezelter)。
公鑰基礎設施和證書授權機構(S. Chokhani)。
防病毒技術(C. Cobb)。
軟體開發與質量保證(D. Levine)。
盜版與反盜版技術(D. Levine)。
第四部分:預防:人為因素。
安全產品標準(P. Brusil & N. Zakin)。
安全政策指導方針(M. Kabay)。
安全意識(K. Rudolph 等)。
道德決策與高科技(J. Linderman)。
雇用實踐與政策(M. Kabay)。
操作安全與生產控制(M. Walsh & M. Kabay)。
電子郵件和互聯網使用政策(M. Kabay)。
與執法機構合作(M. Wright)。
利用社會心理學實施安全政策(M. Kabay)。
電腦安全審計(D. Levine)。
第五部分:檢測。
漏洞評估與入侵檢測系統(R. Bace)。
監控與控制系統(D. Levine)。
應用控制(M. Walsh)。
第六部分:修復。
電腦緊急快速反應小組(B. Cowens & M. Miora)。
數據備份與存檔(M. Kabay)。
業務持續性計劃(M. Miora)。
災難恢復(M. Miora)。
保險救助(R. Parisi, Jr.)。
第七部分:管理的角色。
管理責任與法律責任(C. Hallberg 等)。
制定安全政策(M. Kabay)。
風險評估與風險管理(R. Jacobson)。
Y2K:電腦安全的教訓(T. Braithwaite)。
第八部分:其他考量。
醫療記錄安全(P. Brusil & D. Harley)。
國際加密的使用(D. Levine)。
審查制度與內容過濾(L. Tien & S. Finkelstein)。
網路空間中的隱私(B. Hayes 等)。
網路空間中的匿名性與身份(M. Kabay)。
信息安全的未來(P. Tippett)。
索引。