The Internet security guidebook
From planning to deployement
Résumé
The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely. Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors. Author Bio: Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer.
Juanita Ellis was the lead technical architect in Lotus Consulting for the Southern, Mid Atlantic, and Easter regions of the U. S. She was responsible for designing and architecting enterprise-wide applications that integrated with Enterprise Resource Planning Systems, Internet technologies, and relational and transaction-based systems. She is the co-author of The E-Commerce Book: Building the E-Empire, (1st and 2nd), AP.
Contents- Introduction: Who Is Knocking at the Door?
- Ch. 1 Let's Do Business
- Ch. 2 Security Review
- Ch. 3 Cryptography
- Ch. 4 Secure Networks
- Ch. 5 Protecting Your Intranet from the Extranet and Internet
- Ch. 6 Authentication
- Ch. 7 E-Commerce - Public Key Infrastructure (PKI)
- Ch. 8 Messaging Security
- Ch. 9 What Are We Doing Here?
- Ch. 10 Let's Make the Plans
- Ch. 11 We Have Been Hacked! Oh, the Humanity!
- Ch. 12 The Total Package Specific Steps
- App. 1 Security Tools
- App. 2 The CERT Report
- Glossary
L'auteur - Juanita Ellis
Juanita Ellis was the lead Technical Architect in Lotus Consulting for the Southern, Mid Atlantic and Easter regions of the US. She was responsible for designing and architecting enterprise wide applications that integrated with Enterprise Resource Planning Systems, Internet technologies, relational and transaction based systems.
L'auteur - Timothy Speed
Timothy Speed architecte certifié par IBM, s'occupe de la sécurité des systèmes de messagerie depuis 1992. Il travaille sur Lotus et a participé au montage des infrastructures de courrier pour les jeux olympiques de Nagano et de Sydney.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Academic Press |
Auteur(s) | Juanita Ellis, Timothy Speed |
Parution | 04/07/2002 |
Nb. de pages | 320 |
Format | 18,7 x 23,5 |
Couverture | Broché |
Poids | 700g |
Intérieur | Noir et Blanc |
EAN13 | 9780122374715 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet