Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves - Randall Nichols, Daniel Ryan, Julie Ryan

Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves

Buch | Softcover
704 Seiten
2000
McGraw-Hill Professional (Verlag)
978-0-07-212285-5 (ISBN)
CHF 57,60 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This book discusses how attacks occur and how to stop them before they occur. It shows how to evaluate the network for vlunerablilities and holes and how to plug them, including a detailed discussion of what to do once the network has been attacked and to react.
Learn to stop digital espionage-before it happens!Manage your way to security in an increasingly interconnected world. Network data has become increasingly valuable in today's public and private sectors, as has become painfully clear to those in Fortune 500 companies and to those in top branches of government who store information digitally. But exactly how safe is the informaton that is accessible from a network? According to the expert authors of Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves and RSA Security, the most trusted name in e-security, NO data is safe. In fact, digital espionage, theft and destruction occur every day, and most attacks go undetected until it is too late. This groundbreaking new work discusses the growing vulnerabilities due to interconnectivity and the importance of protecting digital information. It offers detailed explanations of how and why attacks in progress, and quickly recover business operations. This is the first title from RSA Press, the new publishing group from RSA Security. RSA Security helps organizations build secure, trusted foundations for e-business through its two-factor authentication, encryption and public key management systems.

Randall K. Nichols is President of COMSEC Solutions, LLC, a computer security countermeasures firm. He recently served as Technology Director of Crytography and Biometrics for the International Computer Security Association (ICSA). Nichols is considered an expert on cryptanalysis, INFOSEC countermeasures and classical cryptography. Daniel J. Ryan is a lawyer, businessman, and educator. Prior to entering private practice, he served as Corporate Vice President of Science Applications International Corporation with responsibility for government customers and commercial clients who operate worldwide and must create, store, process and communicate sensitive information and engage in electronic commerce. Julie J.C.H. Ryan is President of Wyndrose Technical Group, which provides security engineering, knowledge management consulting, information engineering, and related analytical services to a variety of clients. She started her career as an Air Force Intelligence officer and is currently pursuing a Doctor of Science degree from George Washington University.

Part I: Digital Espionage, Warfare and Information Security (INFOSEC). Chapter 1: Introduction to Digital Espionage. Chapter 2: Foundations of Information Security (INFOSEC). Part II: Infosec Concepts. Chapter 3: Risk Management and Architecture of Information Security (INFOSEC). Chapter 4: Information Security Policy. Chapter 5: Privacy in a Knowlede-Based Economy. Chapter 6: Security Verification of Systems and Networks. Part III: Practical Countermeasures. Chapter 7: Cryptography. Chapter 8: Access Controls--Two Views. Chapter 9: Digital Signatures and Cetification Authorities--Technology, Policy, and Legal Issues. Chapter 10: Permissions Management: Identification, Authentication, and Authorization (PMIAA). Chapter 11: Virtual Private Networks. Chapter 12: Biometric Countermeasures. Part IV: Enterprise Continuity Planning. Chapter 13: Before the Attack: Protect and Detect. Chapter 14: During and After the Attack--Special Consideration--The Web Server. Part V: Order of Battle. Chapter 15: The Big Picture. Chapter 16: Information Warfare. Chapter 17: Information Warfare Weapons, Intelligence, and the Cyberspace Environment. Chapter 18: Methods of Employment. Chapter 19: Public Key Infrastructure: Building Trust Online. Chapter 20: Cryptography Politics: Encryption Export Law and Its Impact on U.S. Industry. Appendix A: The Information Technology Revolution. Appendix B: Definitions of Electronic Signatures in Enacted State Legislation. Appendix C: Enacted Legislation Authorizing the Use of Electronic Images. Appendix D: Policy Initiatives--United States. Appendix E: International--35 Countries and Political Entities Enact Digital Signature Legislation. Appendix F: Bernstein and the Encryption Debate. Appendix G: VPN Comparisons. Appendix H: Liability of Certificate Auhorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislation.

Erscheint lt. Verlag 16.1.2000
Zusatzinfo 250 illustrations
Sprache englisch
Maße 185 x 234 mm
Gewicht 1474 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 0-07-212285-4 / 0072122854
ISBN-13 978-0-07-212285-5 / 9780072122855
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich