The Internet Security Guidebook: From Planning to Deployment (The Korper and Ellis E-Commerce Books Series) - Softcover

Ellis, Juanita

 
9780122374715: The Internet Security Guidebook: From Planning to Deployment (The Korper and Ellis E-Commerce Books Series)

Inhaltsangabe

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely. Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorinnen und Autoren

Juanita Ellis has been at the forefront in working with corporations in the areas of convergence, computer Security and e-business. Some of these companies include Sony, JCPenney, SWBell, Boeing, Xerox, Bell Atlantic, MCI, Citibank and Toyota.

Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant.



Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer.

He and Juanita Ellis are the co-authors of books on Internet security and e-business.

Von der hinteren Coverseite

This book will help the CEO, the CIO, information technology managers, and business persons with an interest in the architecture, design, and configuration of a secure computing environment.This book discusses and reviews the strategies, steps, and procedures necessary to conduct business securely on the Internet.The Internet Security Guidebook: From Planning to Deployment provides an analysis of an enterprise's complete Internet security. Very few organizations take the needed precautions to protect their Internet-facing enterprises. Protection for the Internet-facing enterprise is not just a firewall; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach, offered in this book, evaluates the security needs in relation to the business goals and the current attacks on our Internet. Specific steps that show the reader how to implement security from the individual process to the complete corporate enterprise are discussed and illustrated.From the Foreword by William P. Crowell, President and CEO of Cylink Corporation and former Deputy Directory of the NSA:This book is aimed at providing the reader, in plain English, an understanding of the business risks, the threats, the tools for dealing with the threats, and the processes needed to build more secure systems and continually improve them. The authors understand that the primary objective for the business users of security products is to build businesses that work and make money, not to build fortresses that no one can enter. They emphasize the practical and pragmatic approaches to securing e-business.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.