Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data; Shield data from both the internal and external intruder; Discover products that can detect and prevent these break-ins; Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses; Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs"
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer.
He and Juanita Ellis are the co-authors of books on Internet security and e-business.
Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant.
"Security must become a fabric of the network that strikes the balance between security and usability. Policies, architectures, and processes need to be non-invasive to legitimate users, but impenetrable to would-be attackers." - Craig Tiffany, Network Security Consultant, Cisco Systems
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
· Shield data from both the internal and external intruder
· Discover products that can detect and prevent these break-ins
· Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
· Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs|"Security must become a fabric of the network that strikes the balance between security and usability. Policies, architectures, and processes need to be non-invasive to legitimate users, but impenetrable to would-be attackers." - Craig Tiffany, Network Security Consultant, Cisco Systems
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
· Shield data from both the internal and external intruder
· Discover products that can detect and prevent these break-ins
· Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
· Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781555582982_new
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New. New methods of breaking into corporate networks are resulting in major losses. This book provides the information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. It also explains concepts suc. Artikel-Nr. 596312961
Anzahl: Mehr als 20 verfügbar
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 398 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar. Artikel-Nr. 1619046/202
Anzahl: 3 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. Artikel-Nr. 9781555582982
Anzahl: 2 verfügbar