This book discusses how attacks occur and how to stop them before they occur. It shows how to evaluate the network for vlunerablilities and holes and how to plug them, including a detailed discussion of what to do once the network has been attacked and to react.
"synopsis" may belong to another edition of this title.
Computer security holds a unique position among information technology disciplines. Because threats to systems are so numerous and varied, you can spend years studying them (and general strategies for counteracting them) before you start to work with specific security tools. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves is a guide to computer security that remains one step back from security software itself. In place of specific how-to information, readers learn about the motives of online attackers and the strategies they use to gain unauthorized access to systems and data, plus overarching concepts like public-key cryptography. They also find out about defensive and forensic strategies for preventing attacks and limiting their potency when they occur.
The authors of this book--a cryptographer, a couple of mathematicians, and a handful of others--employ a very text-heavy presentation style that's best suited to attentive study. The prose tends to be dense and a bit academic, and certain conceptual diagrams approach inscrutability. Still, security is a complicated matter, and a simplistic treatment wouldn't be as useful. It's possible to scan the index for a topic that interests you--keystroke biometrics, say--and find a definition and a statement of pros and cons. You'll also find endnote references to more specialized works but little mention of software products that implement the ideas the authors explain. --David Wall
Topics covered: Computer and network security, including risk management, security policy, cryptography, access control, authentication, biometrics, actions to be taken during an attack, and case studies of hacking and information warfare.From the Back Cover:
Learn to stop digital espionage--before it happens!
Network data has become increasingly valuable in today's public and private sectors. But exactly how safe is the information that's accessible from a network? According to the expert authors of Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves, NO data is safe. In fact, digital espionage, theft and destruction occur every day, and most attacks go undetected until it's too late. This groundbreaking new work discusses the growing vulnerabilities and the importance of protecting digital information. It explains how and why attacks occur and shows you how to prevent and detect future attacks.
Key features include:Real-world case studies that show how attacks have been carried out How to evaluate a network for security holes and how to plug them How to detect and react when a network is under attack Evaluation of commercially available virtual private networks Approach to network security that takes business practices into account
This book offers what no other book can: a guide to defending your digital assets against all manner of threats, whatever their motivation or source. The ideas and strategies contained in this book are essential to anyone managing valuable data on a network.
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Companies, 2000. Paperback. Book Condition: New. Never used!. Bookseller Inventory # P110072122854