The Internet Security Guidebook: From Planning to Deployment
Author: Juanita Ellis
This book will help the CEO, the CIO, information technology managers, and business persons with an interest in the architecture, design, and configuration of a secure computing environment.
This book discusses and reviews the strategies, steps, and procedures necessary to conduct business securely on the Internet.
The Internet Security Guidebook: From Planning to Deployment provides an analysis of an enterprise's complete Internet security. Very few organizations take the needed precautions to protect their Internet-facing enterprises. Protection for the Internet-facing enterprise is not just a firewall; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach, offered in this book, evaluates the security needs in relation to the business goals and the current attacks on our Internet. Specific steps that show the reader how to implement security from the individual process to the complete corporate enterprise are discussed and illustrated.
From the Foreword by William P. Crowell, President and CEO of Cylink Corporation and former Deputy Directory of the NSA:
This book is aimed at providing the reader, in plain English, an understanding of the business risks, the threats, the tools for dealing with the threats, and the processes needed to build more secure systems and continually improve them. The authors understand that the primary objective for the business users of security products is to build businesses that work and make money, not to build fortresses that no one can enter. They emphasize the practical and pragmatic approaches to securing e-business.
Book News
A practical guide with well presented explanations of both the technical and human sides of a particular aspect of computer security.
Table of Contents:
Foreword | ||
Preface | ||
Acknowledgments | ||
Copyright Notices and Statements | ||
Introduction: Who Is Knocking at the Door? | 1 | |
Ch. 1 | Let's Do Business | 7 |
Ch. 2 | Security Review | 19 |
Ch. 3 | Cryptography | 43 |
Ch. 4 | Secure Networks | 65 |
Ch. 5 | Protecting Your Intranet from the Extranet and Internet | 95 |
Ch. 6 | Authentication | 121 |
Ch. 7 | E-Commerce - Public Key Infrastructure (PKI) | 139 |
Ch. 8 | Messaging Security | 165 |
Ch. 9 | What Are We Doing Here? | 199 |
Ch. 10 | Let's Make the Plans | 219 |
Ch. 11 | We Have Been Hacked! Oh, the Humanity! | 245 |
Ch. 12 | The Total Package Specific Steps | 255 |
App. 1 | Security Tools | 269 |
App. 2 | The CERT Report | 277 |
Glossary | 305 | |
References | 313 | |
Index | 317 |
See also: African American Foodways or Tofu Mania
Home Health Financial Management
Author: Tad McKeon
Home Health Financial Management is the only comprehensive financial resource written specifically for home health providers. In six parts, each containing three chapters, it addresses the full range of financial issues that confront home health providers. Diagrams, charts, forms, and a glossary of relevant terms make it understandable and useful.
Booknews
Intended for both financial and nonfinancial managers, this text covers six primary areas the author deems necessary for managers to incorporate into their decision-making processes: financial reporting, prospective and retrospective payment systems, cost accounting, management accounting, financial management, and strategic management. The author, a business and finance consultant, stresses the importance of teamwork in working toward an outcome management system that honors clients and coworkers, promotes innovation, and balances clinical and financial organizational requirements. Annotation c. Book News, Inc., Portland, OR (booknews.com)
No comments:
Post a Comment