Scrappy Information Security

Scrappy Information Security

Scrappy Information Security

Michael Seese

22,04 €
IVA incluido
Consulta disponibilidad
Editorial:
THiNKaha,Inc.
Año de edición:
2009
Materia
Privacidad y protección de datos
ISBN:
9781600051326
Páginas:
384
Encuadernación:
Rústica
Añadir a favoritos

The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best to hammer home the message of security through training, communications, and outright begging. The message often falls on deaf ears, not because employees want to make their workplaces unsafe, but rather, because the topic is so complex and wide-ranging that it simply is overwhelming. As an information security professional, it is my charge to make the online world safer for all of us. None of us tolerates a crime spree in our neighborhood. Likewise, we should not tolerate the current crime wave that is sweeping the Internet, one which truly threatens to stifle the e-commerce and e-communications that we have come to know and rely on.They say a little knowledge is a dangerous thing. I agree. People need more than a little knowledge to be safe online. They need to understand how encryption, the Internet, and wireless work so that they can put the pieces together -- literally like a jigsaw puzzle -- to reveal the image of a more secure online world. It is my goal to craft those pieces in such a way that the average reader will understand these technologies, and therefore understand how to apply them to both their corporate and personal cyberselves.This book should be read by anyone who cares about the security and privacy of their online information, and wants to know how to take steps to protect it ... and that should be everyone. This book should be read by anyone who wants to 'do the right thing' and ensure that they do not inadvertently compromise their employer’s, or their own, sensitive information ... and that should be everyone. This book should be read by anyone who believes that crime is crime, it should be stopped, and wants to know what concrete steps he or she can be take to reduce cybercrime and minimize its impacts ... and that should be everyone.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • El derecho al olvido
    Lowry Pressly
    Cada día disminuye la parte de nuestra vida que no está bajo vigilancia y que no se convierte en datos. Podemos configurar los parámetros de privacidad en nuestros dispositivos y redes sociales, pero sabemos que nuestros esfuerzos son insignificantes ante el capitalismo de vigilancia y la manipulación algorítmica. En nuestra era hiperconectada, muchos han comenzado a preguntars...
    Disponible

    25,95 €

  • Windows Server 2016 Security, Certificates, and Remote Access Cookbook
    Jordan Krause
    ...
    Disponible

    42,09 €

  • ASIACCS '18
    ASIACCS
    We are pleased to present herein the proceedings of the 13th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2018) held in Incheon, Korea, June 4-8, 2018. ASIACCS 2018 is organized by AsiaCCS 2018 organizing committee, supported by ACM SigSAC, Korea Institute of Information Security &Cryptography (KIISC). We received 310 submissions. This year's ...
    Disponible

    293,98 €

Otros libros del autor

  • Scrappy Business Contingency Planning
    Michael Seese
    In simple terms, business contingency planning (BCP) is the art of preparing an enterprise for 'bad things.' The bottom line is that you are trying to enable your organization to withstand an unlikely, though not unexpected, event. But a good business contingency plan should help you weather even an unexpected event, that is, something that 'can’t happen here.' Developing a bus...