Skip Navigation
List Price: $41.78

Rent Book

Select for Price
Add to Cart Free Shipping
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

Access Denied : The Complete Guide to Protecting Your Business Online,9780072133684

Access Denied : The Complete Guide to Protecting Your Business Online

by
Edition: 1st
Format: Hardcover
Pub. Date: 1/1/2001
Publisher(s): MCGRAW HILL BOOK COMPANY
Availability: This title is currently not available.

Summary

(Osborne) Explains computer security in plain, non-technical language, outlining key issues and how to deal with them. Includes forms and templates for creating a feasible security policy for intellectual property. Aimed especially at those whose employees are mobile or those who use wireless technology.

Author Biography

Cathy Cronkhite is Principal Consultant for Xerox Connect in San Diego.

Table of Contents

Acknowledgments xi
Introduction xiii
Understanding Hackers and How They Attack
1(16)
Chapter at a Glance
2(1)
Types of Hackers
2(3)
The Hacker Culture
5(1)
The Motivations of a Hacker
6(2)
Hacker's Toolkit
8(4)
Security Best Practices
12(2)
Best Practice Action Steps for Organizations
14(1)
Best Practice Action Steps for the Small or Home Office
14(3)
Viruses, Hoaxes, and Other Computer Pests
17(18)
Chapter at a Glance
18(1)
Viruses
18(5)
Other Computer Pests
23(2)
Virus and Other Malware Hoaxes
25(2)
Antivirus Technology
27(2)
Safe Practices
29(3)
Best Practice Action Steps for Organizations
32(1)
Best Practice Action Steps for the Small or Home Office
33(2)
Keeping Electronic Mail Under Control
35(22)
Chapter at a Glance
36(1)
Reducing Unnecessary Email Volume
36(13)
Privacy
49(3)
Email Best Practices
52(2)
Types of Email Systems
54(1)
Best Practice Action Steps for the Organization
55(1)
Best Practice Action Steps for the Small or Home Office
55(2)
Website and Ecommerce Security Issues
57(16)
Chapter at a Glance
58(1)
Website and Ecommerce Vulnerabilities
58(11)
Website and Ecommerce Best Practices
69(2)
Best Practice Action Steps for the Organization
71(1)
Best Practice Action Steps for the Small or Home Office
72(1)
Encryption Types and Their Appropriate Use
73(22)
Chapter at a Glance
74(1)
The Background of Cryptography
74(13)
Encryption Attacks
87(2)
Encryption Vulnerabilities
89(1)
Encryption Applications
90(3)
Cryptography and the Law
93(1)
Encryption Best Practices
93(1)
Best Practice Action Steps for the Organization
94(1)
Best Practice Action Steps for the Small or Home Office
94(1)
Protecting Information from Loss, Fraud, and Theft
95(22)
Chapter at a Glance
96(1)
Typical Threats to Data
96(1)
Evaluating Data Backup Systems
97(6)
Backup Media Selection Criteria
103(1)
Types of Storage
104(2)
Types of Media
106(6)
Implementing a Schedule
112(1)
Limiting Data Access
113(1)
Best Practice Action Steps for the Organization
114(1)
Best Practice Action Steps for the Small or Home Office
115(2)
Network Security Weaknesses
117(24)
Chapter at a Glance
118(1)
How Do Hackers Break into Your Network?
118(6)
Operating System Pros and Cons
124(3)
How Can You Defend Your Network?
127(1)
Passwords
128(9)
Clearance Policies
137(1)
Preemptive Hacking
137(1)
Best Practice Action Steps for the Organization
138(1)
Best Practice Action Steps for the Small or Home Office
139(2)
Limiting Physical Access to Computer Systems
141(30)
Chapter at a Glance
142(1)
Determining Level of Risk
142(1)
Natural Disasters and Catastrophes
143(5)
Malicious Attack
148(1)
Planning and Recovery
149(1)
Security Clearances
150(2)
Common Physical Threats and Vulnerabilities
152(6)
Physical Access Controls
158(6)
Monitoring and Deterrence
164(2)
Sensitive Data Security
166(1)
Education
167(1)
Responding to Intrusion
167(1)
Best Practice Action Steps for the Organization
168(1)
Best Practice Action Steps for the Small or Home Office
169(2)
Remote Computing Concerns
171(22)
Chapter at a Glance
172(1)
The Virtual Office and Telecommuting
172(4)
Mobile Devices
176(2)
Wireless Networking
178(3)
Wireless Devices
181(9)
Best Practice Action Steps for the Organization
190(1)
Best Practice Action Steps for the Small or Home Office
190(3)
Responding to Attacks
193(16)
Chapter at a Glance
194(1)
Discovering an Intrusion
194(3)
Responding to a Security Compromise
197(8)
Post Mortem
205(2)
Best Practice Action Steps for the Organization
207(1)
Best Practice Action Steps for the Small or Home Office
208(1)
Establishing Safe Business Practices
209(32)
Chapter at a Glance
210(1)
Risk Assessment
210(4)
Security Policies and Procedures
214(21)
Information Security Team
235(3)
Hiring Practices
238(1)
Best Practice Action Steps for the Organization
239(1)
Best Practice Action Steps for the Small or Home Office
240(1)
Appendix A Web Resources 241(6)
Chapter 1: Understanding Hackers and How They Attack
242(1)
Chapter 2: Viruses, Hoaxes, and Other Computer Pests
242(1)
Chapter 3: Keeping Electronic Mail Under Control
243(1)
Chapter 4: Website and Ecommerce Security Issues
243(1)
Chapter 5: Encryption Types and Their Appropriate Use
243(1)
Chapter 6: Protecting Information from Loss, Fraud, and Theft
244(1)
Chapter 7: Network Security Weaknesses
245(1)
Chapter 8: Limiting Physical Access to Computer Systems
245(1)
Chapter 9: Remote Computing Concerns
245(1)
Chapter 10: Responding to Attacks
246(1)
Chapter 11: Establishing Safe Business Practices
246(1)
Appendix B Forms and Templates 247(8)
Antivirus Software Comparison Form
248(1)
Antivirus Data Form
249(1)
Risk Analysis Form
250(1)
Security Policy Template
251(4)
Glossary 255(18)
Index 273

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.

Visa
Mastercard
American Express
Comodo
McAfee