Flylib.com
IT Security: Risking the Corporation
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73
Authors:
Linda McCarthy
BUY ON AMAZON
Main Page
Table of content
Copyright
Foreword
Acknowledgments
About the Author
Introduction
About this Book
How this Book Is Organized
About Hackers
Chapter 1. Responding to Attacks
Incident-Response Nightmare
Let s Not Go There...
Final Words
Chapter 2. Out-of-the-Box Security
Deal with Security Later
Let s Not Go There
Final Words
Chapter 3. Executive Support
Executive Commitment
Let s Not Go There
Final Words
Chapter 4. Network Access
Partner Connections
Let s Not Go There...
Final Words
Chapter 5. Security Training
Overlooking Training
Let s Not Go There...
Final Words
Chapter 6. Unplanned Security
Transition Plan
Let s Not Go There...
Final Words
Chapter 7. Maintaining Security
Responsible for Security
Let s Not Go There...
Final Words
Chapter 8. Internal Network Security
Unsafe Network
Let s Not Go There
Final Words
Chapter 9. Outsourcing Security
Forget Security?
Let s Not Go There
Final Words
Chapter 10. Unsecure Email
Email or See Mail?
Let s Not Go There...
Final Words
Chapter 11. Looking Back: What s Next?
Risking the Corporation
Legal Duties to Protect Information and Networks
Business Initiatives and Corporate Goals
Threats Require Action
Chapter 12. A Hacker s Walk Through the Network
A Hacker s Profile
Walking with the Hacker
What the Hacker Was Doing
Conclusion
Appendix A. People and Products to Know
Security-Related Organizations
Security Resources
Security Vulnerability Archives
Popular Mailing Lists
Consulting Firms
Security Crime Investigation
Insuring Information Technology
Software You Need to Know About
Product Vendors
Acronyms
Glossary
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73
Authors:
Linda McCarthy
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Number Crunching Mathematical and Relational Operators and Commands
The Art of Using Animated Sprites for 2D Games
Adding Sound Effects to Your Game
Playing Some Tunes CD Audio, MIDI and MP3 Music
Epilogue
Visual C# 2005 How to Program (2nd Edition)
Self-Review Exercises
Referring to the Current Objects Members with the this Reference
Indexers
Self-Review Exercises
Exercises
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
The ARC Buffer Manager
Prerequisites
Summary
Client 4An Interactive Command Processor
Internationalization and Localization
The Java Tutorial: A Short Course on the Basics, 4th Edition
Creating and Using Interfaces
Catching and Handling Exceptions
Advantages of Exceptions
Overview of the Swing API
Example Two: SwingApplication
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Logistics in Tesco: Past, Present and Future
Rethinking Efficient Replenishment in the Grocery Sector
Transforming Technologies: Retail Exchanges and RFID
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Handling WMI Events
The WMI Schema
WMI Providers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies