Information security [electronic resource] : a manager's guide to thwarting data thieves and hackers / Philip Alexander.

By: Contributor(s): Material type: TextTextSeries: PSI business securityPublication details: Westport, Conn. : Praeger Security International, 2008.Description: viii, 175 pSubject(s): Genre/Form: DDC classification:
  • 005.8 22
LOC classification:
  • HF5548.37 .A44 2008eb
Online resources:
Contents:
Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes index.

Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.

Electronic reproduction. Palo Alto, Calif. : ebrary, 2013. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.

There are no comments on this title.

to post a comment.