ShopSpell

The Internet Security Guidebook From Planning to Deployment [Paperback]

$93.99       (Free Shipping)
86 available
  • Category: Books (Computers)
  • Author:  Juanita Ellis, Tim Speed
  • Author:  Juanita Ellis, Tim Speed
  • ISBN-10:  0122374711
  • ISBN-10:  0122374711
  • ISBN-13:  9780122374715
  • ISBN-13:  9780122374715
  • Publisher:  Academic Press
  • Publisher:  Academic Press
  • Pages:  320
  • Pages:  320
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Apr-2001
  • Pub Date:  01-Apr-2001
  • SKU:  0122374711-11-MPOD
  • SKU:  0122374711-11-MPOD
  • Item ID: 100910761
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 25 to Dec 27
  • Notes: Brand New Book. Order Now.
The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.

Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.Foreword
Preface
Acknowledgements
Copyright Notices and Statements
Introduction Who Is Knocking at the Door?
Chapter 1 Let's Do Business
1.1 Security Components
1.2 Do You Have a Process?
1.3 The Cost of Security
Chapter 2 Security Review
2.1 Review the Business
2.2 What Is a Trusted Network?
2.3 Initial Risk Analysis
2.4 The Policy
2.5 Implementation and Feedback
Chapter 3 Cryptography
3.1 History
3.2 Key Types
3.3 RSA-Public and Private Key
3.4 PKI and Business Solutions
Chapter 4 Secure Networks
lS)
Add Review