Flylib.com
IT Security: Risking the Corporation
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73
Authors:
Linda McCarthy
BUY ON AMAZON
Main Page
Table of content
Copyright
Foreword
Acknowledgments
About the Author
Introduction
About this Book
How this Book Is Organized
About Hackers
Chapter 1. Responding to Attacks
Incident-Response Nightmare
Let s Not Go There...
Final Words
Chapter 2. Out-of-the-Box Security
Deal with Security Later
Let s Not Go There
Final Words
Chapter 3. Executive Support
Executive Commitment
Let s Not Go There
Final Words
Chapter 4. Network Access
Partner Connections
Let s Not Go There...
Final Words
Chapter 5. Security Training
Overlooking Training
Let s Not Go There...
Final Words
Chapter 6. Unplanned Security
Transition Plan
Let s Not Go There...
Final Words
Chapter 7. Maintaining Security
Responsible for Security
Let s Not Go There...
Final Words
Chapter 8. Internal Network Security
Unsafe Network
Let s Not Go There
Final Words
Chapter 9. Outsourcing Security
Forget Security?
Let s Not Go There
Final Words
Chapter 10. Unsecure Email
Email or See Mail?
Let s Not Go There...
Final Words
Chapter 11. Looking Back: What s Next?
Risking the Corporation
Legal Duties to Protect Information and Networks
Business Initiatives and Corporate Goals
Threats Require Action
Chapter 12. A Hacker s Walk Through the Network
A Hacker s Profile
Walking with the Hacker
What the Hacker Was Doing
Conclusion
Appendix A. People and Products to Know
Security-Related Organizations
Security Resources
Security Vulnerability Archives
Popular Mailing Lists
Consulting Firms
Security Crime Investigation
Insuring Information Technology
Software You Need to Know About
Product Vendors
Acronyms
Glossary
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73
Authors:
Linda McCarthy
BUY ON AMAZON
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Training
Appendix A MRP vs. Kanban
Appendix E EOQ vs. Kanban
Appendix F Implementation in Large Plants
Appendix G Intra-Cell Kanban
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 215 Feeders
Article 336 Power and Control Tray Cable Type TC
Article 360 Flexible Metallic Tubing Type FMT
Article 394 Concealed Knob-and-Tube Wiring
Example No. D8 Motor Circuit Conductors, Overload Protection, and Short-Circuit and Ground-Fault Protection
Extending and Embedding PHP
Data Retrieval
Summary
Persistent Resources
The Evolution of the PHP Object Type
ext_skel
Comparing, Designing, and Deploying VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
Summary
Summary
Java All-In-One Desk Reference For Dummies
Making Choices
Working with Statics
Using the LinkedList Class
Network Programming
Using Regular Expressions
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Classic Controls
Modern Controls
GDI+ Basics
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies