Defending Your Digital Assets
Книги

Defending Your Digital Assets

Книги

Defending Your Digital Assets

Nichols, R. Defending Your Digital Assets : Against Hackers, Crackers, Spies and Thieves / R. Nichols, D.J. Ryan, J.J.C.H. Ryan. — New York : McGraw-Hill, 2000. — 246 p.. — . Защита Ваших цифровых активов против хакеров, шпионов и воров.. — 350.00 р.

Аннотация

Defending Your Digital Assets is a comprehensive manual dealing with data security in the context of our increasingly computerised society. More than a good read, it is a programme of defensive measures and good practice when dealing with your information and computers. It features excellent, clinical and frankly chilling portraits of the crimes and criminals that constantly endanger the security of our information, and provides insightful little chapters (and a very good appendix) discussing technologies that have developed during the decades-long war waged against digital criminals and info-terrorists. The approach is practical rather than alarmist, with numerous case studies included. While the authors clearly delineate the vulnerabilities of the systems that serve us, and the inevitability of attacks by the new criminals, they go much further. The book outlines defensive steps to be considered by each of us, from risk assessment through to legislation, pausing along the way to evaluate and elucidate both hardware and software technologies that have been employed in the battle. The reading level varies significantly through the book, and the non-technician may well find some sections too involved. But there is plenty of meat everywhere, and even those who have to skip some portions are likely to come away with a good deal of technical knowledge as a bonus. One practical section helps readers create a tutorial on security policy awareness. The index is a pleasant surprise-a work of near perfection. Along with the appendices (which among other delicacies have capsule histories of various security technologies) it makes this a useful reference book as well as a level-headed guide through a problem zone. - Wilf Hey Synopsis This book discusses how attacks occur and how to stop them before they occur. It shows how to evaluate the network for vlunerablilities and holes and how to plug them, including a detailed discussion of what to do once the network has been attacked and to react.

Отзывы читателей

0