Information Technology

Security & Auditing

Per Page:

UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management

Bozidar Levi
May 29, 2002

To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still more challenges. UNIX Administration: A Comprehensive Sourcebook for Effective Systems &...

Securing and Controlling Cisco Routers

Peter T. Davis
May 15, 2002

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco...

Securing Windows NT/2000: From Policies to Firewalls

Michael A. Simonyi
April 29, 2002

In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical...

The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions

Rebecca Herold
December 20, 2001

Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response...

Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

Thomas R. Peltier
December 20, 2001

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business...

Building an Information Security Awareness Program

Mark B. Desman
October 30, 2001

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't...

A Practical Guide to Security Engineering and Information Assurance

Debra S. Herrmann
October 18, 2001

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and...

Securing E-Business Applications and Communications

Jonathan S. Held, John Bowers
June 22, 2001

Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the basics of security to the development and...

A Technical Guide to IPSec Virtual Private Networks

James S. Tiller
December 11, 2000

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks...

Secure Computers and Networks: Analysis, Design, and Implementation

Eric A. Fisch, Gregory B. White
December 28, 1999

This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new...

Business Resumption Planning, Second Supplement

Edward S. Devlin, Cole Emerson, Leo A. Wrobel, Mark B. Desman
December 27, 1999

Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization. It provides the information you need in order to coordinate first responders...

Access Device Fraud and Related Financial Crimes

Jerry Iannacci
September 29, 1999

Access Device Fraud and Related Financial Crimes offers front-line exposure. It is a reference text that affords the student, financial investigator or law enforcement professional a true insight into a wide spectrum of criminal activity involving financial crimes. This book brings the reader...