Illustrated tutorial on developing security

Affiliates: 0,03 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 1
Refunds: 0

Uploaded: 02.01.2006
Content: security.exe 962,31 kB

Product description

The development of the Internet is pushing the organization to expand their networks. This helps to attract new customers and build relationships with them on a new economic basis, which in turn causes the need for new books and manuals. In addition, Internet opens the way to electronic information assets of organizations, including the attackers. Openness Internet does care about the safety a priority.

Business success is ensured by careful planning, especially in security matters. Do not think that buying a firewall, you can assume that your networks are sufficiently protected. First you must determine what you want to protect. All these issues are governed by the rules of information security. Rules are a set of instructions to be followed in the development of measures and means of information security in the organization.

Development of effective information security rules also requires proper planning. This book gives an explanation of all issues relating to the development of information security regulations. In addition, it describes the different areas of the application of theoretical positions of information security and offer samples wording of safety rules.

Links to a variety of sources to help develop high-quality documents defining the organization's security policy. Despite the fact that all sources say that the rules are soundly formulated the basis for developing an effective program of protection of information, more than 60% of organizations are guided by outdated safety regulations or do not have any. This book is intended for those who want to develop effective safety rules, but does not know how to start this.

The purpose of the book - to give examples of safety rules, so that those who will develop rules of information security, can use ready-made formulations. In the end, having finished formulation of safety regulations, it will be much easier to do the job of network security

Additional information

Part I. Getting Started on the rules
Chapter 1. What is an information security policy
Chapter 2. Determining policy goals
Chapter 3. Responsibilities in the field of information security
Part II. The development of safety rules
Chapter 4. Physical security
Chapter 5. Authentication and Network Security
Chapter 6. Safety Internet
Chapter 7. Safety-mail
Chapter 8. viruses, "worms" and "Trojan horses"
Chapter 9. Encryption
Chapter 10 Rules of software development
Part III. Maintenance rules
Chapter 11. Rules reliable operation
Chapter 12. Approval and implementation
Chapter 13. The process of revising the rules
Part IV. Apps
Appendix A: Glossary
Appendix B: Resources
Appendix B. Examples of rules


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)