Network Security in the '90s: Issues and Solutions for Managers (Wiley Professional Computing) - Softcover

Madron, Thomas W.

 
9780471547778: Network Security in the '90s: Issues and Solutions for Managers (Wiley Professional Computing)

Inhaltsangabe

An examination of network security discusses risk analysis issues, the impact of security on performance, and the degree of security necessary, as well as providing a survey of commercially available security products. Original.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorin bzw. den Autor

About the author THOMAS W. MADRON has an extensive background in designing and implementing local area networks. He is currently an independent consultant and has authored over 100 articles and books, including Local Area Networks: The Next Generation, Second Edition and Enterprise-Wide Computing: How to Implement and Manage LANs.

Von der hinteren Coverseite

Network Security in the 90s Issues and Solutions for Managers How do you protect your company s computer data? How do you create a "tamperproof office"? These are two of the biggest challenges facing today s managers. Now, a well–known expert helps you quickly assess whether your network is secure and if not, what needs to be done and what it will cost you. Written especially for managers, this practical guide provides you with valuable information on the important issues, implications, and strategies behind the management and maintenance of secure electronic systems. Then, you ll be prepared to make the right choices for your own organization. Packed with the latest, most up–to–date information, Network Security in the 90s also:

  • Discusses risk analysis issues, the impact of security on performance, and how much protection is enough
  • Provides a model system to illustrate the scope of security and information integrity
  • Includes a survey of commercially available security products including access control products, data encryption, disaster recovery, and physical security
  • Discusses proven methods for preventing unauthorized access
  • Explains how to effectively deal with worms and viruses

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.