Computer Security PDF ePub eBook

Books Info:

Computer Security free pdf Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you'll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include: phishing and spyware- identity theft- Workplace access- Passwords- Viruses and malware- Remote access- E-mail- Web surfing and Internet use- Instant messaging- Personal firewalls and patches- Hand-held devices- data backup- management of sensitive information- Social engineering tactics- Use of corporate resources. Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experience in the area of information systems security and privacy.

About Ben Rothke

Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design

Details Book

Author : Ben Rothke
Publisher : Osborne/McGraw-Hill
Data Published : 01 March 2006
ISBN : 0072262826
EAN : 9780072262827
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 64 pages
Age + : 15 years
Language : English
Rating :

Reviews Computer Security



17 Comments Add a comment




Related eBooks Download


  • Advances in Information Security Management and Small Systems Security free pdfAdvances in Information Security Management and Small Systems Security

    This book presents a state-of-the-art review of current perspectives in information security. focusing on technical as well as functional issues. The topics in this volume include the latest developments in: Information security management issues- Network security and protocols- Information security aspects of E-commerce- Distributed computing and access control- Security in mobile environments- Advances in intrusion detection- and..


  • PCI Data Security Standards (PCI DSS) free pdfPCI Data Security Standards (PCI DSS)

    The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit. credit..


  • Encyclopedia of Corporate Social Responsibility free pdfEncyclopedia of Corporate Social Responsibility

    The role of Corporate Social Responsibility in the business world has developed from a fig leaf marketing front into an important aspect of corporate behavior over the past several years. Sustainable strategies are valued..


  • Information Security Management and Small Systems Security free pdfInformation Security Management and Small Systems Security

    This book presents a state-of-the-art review of current perspectives in information security management and small systems security. focusing on technical and functional as well as managerial issues..


  • ISSE 2012 Securing Electronic Business Processes free pdfISSE 2012 Securing Electronic Business Processes

    This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy- Enterprise and Cloud Computing Security- Security and Privacy Impact of Green Energy- Human Factors of IT Security- Solutions for Mobile Applications- Identity


  • Computer Security free pdfComputer Security

    . Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining t