Flylib.com
IT Security: Risking the Corporation
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73
Authors:
Linda McCarthy
BUY ON AMAZON
Main Page
Table of content
Copyright
Foreword
Acknowledgments
About the Author
Introduction
About this Book
How this Book Is Organized
About Hackers
Chapter 1. Responding to Attacks
Incident-Response Nightmare
Let s Not Go There...
Final Words
Chapter 2. Out-of-the-Box Security
Deal with Security Later
Let s Not Go There
Final Words
Chapter 3. Executive Support
Executive Commitment
Let s Not Go There
Final Words
Chapter 4. Network Access
Partner Connections
Let s Not Go There...
Final Words
Chapter 5. Security Training
Overlooking Training
Let s Not Go There...
Final Words
Chapter 6. Unplanned Security
Transition Plan
Let s Not Go There...
Final Words
Chapter 7. Maintaining Security
Responsible for Security
Let s Not Go There...
Final Words
Chapter 8. Internal Network Security
Unsafe Network
Let s Not Go There
Final Words
Chapter 9. Outsourcing Security
Forget Security?
Let s Not Go There
Final Words
Chapter 10. Unsecure Email
Email or See Mail?
Let s Not Go There...
Final Words
Chapter 11. Looking Back: What s Next?
Risking the Corporation
Legal Duties to Protect Information and Networks
Business Initiatives and Corporate Goals
Threats Require Action
Chapter 12. A Hacker s Walk Through the Network
A Hacker s Profile
Walking with the Hacker
What the Hacker Was Doing
Conclusion
Appendix A. People and Products to Know
Security-Related Organizations
Security Resources
Security Vulnerability Archives
Popular Mailing Lists
Consulting Firms
Security Crime Investigation
Insuring Information Technology
Software You Need to Know About
Product Vendors
Acronyms
Glossary
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73
Authors:
Linda McCarthy
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
Appendix A Solutions to Exercises
The .NET Developers Guide to Directory Services Programming
Summary
Property and Method Overview
Searching the Global Catalog
Authentication Using SSPI
Appendix C. Troubleshooting and Help
SQL Tips & Techniques (Miscellaneous)
Working with Queries, Expressions, and Aggregate Functions
Creating Indexes for Fast Data Retrieval
Working with Comparison Predicates and Grouped Queries
Working with Ms-sql Server Information Schema View
Repairing and Maintaining MS-SQL Server Database Files
Oracle Developer Forms Techniques
GUI Development
Standard Toolbar Implementation
The Work-around for PL/SQL 2.x Limitations in Forms 4.5
Additional Interesting Techniques
Summary
Special Edition Using Crystal Reports 10
Conditional Formatting Using Data to Drive the Look of a Report
The Application Tier
The Server Tier: Overview of the Crystal Enterprise Services
Understanding Microsofts .NET Platform
Implementing the Page Viewer
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies