Skip Navigation
List Price: $75.19

Rent Book

Select for Price
Add to Cart Free Shipping
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves,9780072122855

Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves

by
Edition: 1st
Format: Paperback
Pub. Date: 3/1/2000
Publisher(s): MCGRAW HILL BOOK COMPANY
Availability: This title is currently not available.

Summary

Offers a guide to defending your digital assets against all manner of threats, whatever their motivation or source. Discusses the growing vulnerability of digital information and the importance of protecting of this information. Softcover.

Author Biography

Daniel J. Ryan is currently an Adjunct Professor of Information Security and Internet Law for George Washington University and James Madison University.

Table of Contents

Part I: Digital Espionage, Warfare and Information Security (INFOSEC).

Chapter 1: Introduction to Digital Espionage.

Chapter 2: Foundations of Information Security (INFOSEC).

Part II: Infosec Concepts.

Chapter 3: Risk Management and Architecture of Information Security (INFOSEC).

Chapter 4: Information Security Policy.

Chapter 5: Privacy in a Knowlede-Based Economy.

Chapter 6: Security Verification of Systems and Networks.

Part III: Practical Countermeasures.

Chapter 7: Cryptography.

Chapter 8: Access Controls--Two Views.

Chapter 9: Digital Signatures and Cetification Authorities--Technology, Policy, and Legal Issues.

Chapter 10: Permissions Management: Identification, Authentication, and Authorization (PMIAA).

Chapter 11: Virtual Private Networks.

Chapter 12: Biometric Countermeasures.

Part IV: Enterprise Continuity Planning.

Chapter 13: Before the Attack: Protect and Detect.

Chapter 14: During and After the Attack--Special Consideration--The Web Server.

Part V: Order of Battle.

Chapter 15: The Big Picture.

Chapter 16: Information Warfare.

Chapter 17: Information Warfare Weapons, Intelligence, and the Cyberspace Environment.

Chapter 18: Methods of Employment.

Chapter 19: Public Key Infrastructure: Building Trust Online.

Chapter 20: Cryptography Politics: Encryption Export Law and Its Impact on U.S. Industry.

Appendix A: The Information Technology Revolution.

Appendix B: Definitions of Electronic Signatures in Enacted State Legislation.

Appendix C: Enacted Legislation Authorizing the Use of Electronic Images.

Appendix D: Policy Initiatives--United States.

Appendix E: International--35 Countries and Political Entities Enact Digital Signature Legislation.

Appendix F: Bernstein and the Encryption Debate.

Appendix G: VPN Comparisons.

Appendix H: Liability of Certificate Auhorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislation.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.

Visa
Mastercard
American Express
Comodo
McAfee