击退黑客:IT安全非技术性指南

击退黑客:IT安全非技术性指南
作 者: Robert Schifreen
出版社: John Wiley & Sons
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《击退黑客:IT安全非技术性指南》作者简介

内容简介

The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue. Robert Schifreen, a self-confessed ex-hacker, made history in 1985 when he became the first person in the world to face a jury trial in connection with computer hacking. His subsequent acquittal in the High Court led to a change in UK Law and the introduction of the Computer Misuse Act 1990. His 20 years experience in IT security now lends itself to global radio and TV broadcasts, as well as appearances at conferences and lectures around the world. Keeping your company’s computers free from hackers, viruses, spammers, phishing attacks, social engineers and all the other things that can result in loss of data is a difficult job. Defeat...

图书目录

Chapter 1: Introduction

Chapter 2: A Hacker is Made

Chapter 3: Preparation and Planning

Chapter 4: International Laws and Standards

Chapter 5: Passwords and Beyond

Chapter 6: Your Information Security Policy

Chapter 7: Security Awareness Training

Chapter 8: Patch Management

Chapter 9: Windows Workstation Security

Chapter 10: Basic Server Security

Chapter 11: Understanding Firewalls

Chapter 12: Protecting Your Web Site

Chapter 13: Wireless Networking

Chapter 14: Penetration Testing

Chapter 15: Security Through Obscurity

Chapter 16: Windows Vista

Chapter 17: Email

Chapter 18: The Curse of Spam

Chapter 19: Viruses

Chapter 20: Spyware, Adware and Rogue Diallers

Chapter 21: Piracy

Chapter 22: File Sharing and ‘P2P’

Chapter 23: Backups and Archives

Chapter 24: Preventing Internet Misuse

Chapter 25: Document Security

Chapter 26: Data Theft

Chapter 27: Encryption

Chapter 28: Employees’ Own Computers

Chapter 29: How Hackers Use Search Engines

Chapter 30: Denial of Service Attacks

Chapter 31: Provisioning and Identity Management

Chapter 32: Data Interception

Chapter 33: Out of the Office

Chapter 34: Social Engineering

Chapter 35: E-Commerce Fraud

Chapter 36: Intrusion Detection Systems

Chapter 37: Outsourcing

Chapter 38: Securing your Premises

Chapter 39: Forensics

Chapter 40: Planning for the Worst

Chapter 41: Hardware Theft

Chapter 42: Let’s Be Careful Out There

Index