Computer Security: Protecting Digital Resources: Protecting Digital Resources (Google eBook)

Front Cover
Jones & Bartlett Publishers, Jun 23, 2009 - Computers - 453 pages
0 Reviews
Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more and more threats are made on our internet environment. This book is oriented toward the average computer user, business professional, government worker, and those within the education community, with the expectation that readers can learn to use the network with some degree of safety and security. The author places emphasis on the numerous vulnerabilities and threats that are inherent in the Internet environment. Efforts are made to present techniques and suggestions to avoid identity theft and fraud. Readers will gain a clear insight into the many security issues facing the e-commerce, networking, web, and internet environments, as well as what can be done to keep personal and business information secure.
  

What people are saying - Write a review

LibraryThing Review

User Review  - puitmpahang - LibraryThing

Today, society is faced with numerous internet schemes, fraudulent scams, and identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a ... Read full review

Contents

CYBER ENVIRONMENT AND SECURITY ISSUES
3
The Cyber Environment
9
Resource and Asset Protection
15
Ethics
19
KEY TERMS
25
Attacks
32
Vulnerabilities
41
Other Security Breaches
47
CHAPTER SUMMARY
219
BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING
225
Theft Prevention Techniques
231
Corporate Planning
237
Authentication Techniques
243
Security Policy
251
KEY TERMS
258
Intrusion Detection System
263

Responding to Internet and Network Attacks
54
KEY TERMS
60
Protecting Personal Information
68
Combating Identity Theft and Fraud
80
COMPUTER AND DIGITAL ASSETS SECURITY
87
Physical Property Security
96
Preventing Damage to Physical Assets
98
CHAPTER SUMMARY
105
Network Access Communication Devices
112
Security Issues in Virtual Networks
119
Network Resource Access
125
Software
132
SECURITY REVIEW QUESTIONS
138
Wireless LAN
145
Extranet and Intranet LAN Issues
154
LAN Network Management
160
ClientServer Systems
169
Data and Database Attacks
175
Physical Asset Protection
184
RESEARCH ACTIVITIES
190
ECOMMERCE SECURITY MECHANISMS
191
Data Security and Encryption
198
Wireless LAN
206
Security Protocols
213
HostBased Intrusion Detection System
269
System Processes
275
Requirements for Effective Prevention
282
PROBLEM SOLVING AND SECURITY ADMINISTRATION
289
Network Problem Solving
298
Managing the Network
306
Common Management Information Protocol
312
SECURITY SOLUTIONS FOR DIGITAL RESOURCES
319
Security System Project Management
325
Quality Control Issues
331
Standards
336
Specifications
347
KEYTERMS
355
TRAINING CERTIFICATIONS AND CAREERS
359
Certificates
366
eBusiness Process Solutions
375
CHAPTER SUMMARY
383
ANSWERS TO CHAPTER SECURITY REVIEW QUESTIONS
401
Chapter 9
407
APPENDIX E INTERNET PROTOCOL ADDRESSES
415
Configuration Audit and Control Systems
420
Glossary
429
Selected Bibliography
443
Copyright

Common terms and phrases

Bibliographic information