The 5th Edition reflects today's rapidly changing IT industry. Corporate Computer Security will give you a solid technical understanding of security tools with a managerial focus. This practical guide to proactively defending corporate systems from attacks includes coverage of the technical aspects of countermeasures. You'll also benefit from real-world case studies that illustrate how corporations are impacted by concepts learned in each chapter. Key findings from annual industry reports also accompany each case, followed by discussion questions designed to help you apply, analyse, and synthesise the material.
Additions include a new opening case, hands-on projects, and more content on data breaches. Updated news, business-focused, ethics and technical articles have also been added, while statistics, standards and laws are current throughout.
Auflage
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
ISBN-13
978-0-13-582278-4 (9780135822784)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Randall Boyle is an associate professor of management information systems, and Willard Eccles Fellow, at Weber State University in the Goddard School of Business and Economics. His research areas include deception detection in computer-mediated environments, data breaches, secure information systems, the effects of IT on cognitive biases, and the effects of IT on knowledge workers. His teaching is primarily focused on management information systems, information security, and networking. He has authored several books including Using MIS, Experiencing MIS, Corporate Computer and Network Security, Applied Information Security, and Applied Networking Labs.
Ray Panko is Professor Emeritus of Information Technology Management at the University of Hawai`i's Shidler College of Business. His main courses are networking and security. He received his doctorate from Stanford University, where his dissertation was conducted under contract to the Office of the President of the United States.
The Threat Environment
Planning and Policy
Cryptography
Secure Networks
Access Control
Firewalls
Host Hardening
Application Security
Data Protection
Incident and Disaster Response
Module A. Networking Concepts