RSA Press -- RSA is the leading developer of data encryption and cryptography in the US. RSA is synonomous with Security and encryption.
-- Advice from the pros -- This is the book that discusses how attacks occur and how to stop them before they occur! This is of interest to not only the network adminsitrator, but the CIO, LAN Manager, and anyone with valuable data on a network. This is critical information considering:
-- IDC analyst found most attacks (70% !) come from within the company or organization, not from industrial thieves or political activists.
-- No Data is Safe! Everyone from the New York Times, the US Senate, and Large ISP's, to Fortune 500 corporations and even the FBI. 50% of all networks get attacked by hackers (Source: IDC).
-- Administrators usually don't even know they are under attack! Less the 3% of all hacker attacks are even detected and less than 1% are ever reported to the FBI (Source: ComputerWorld Magazine).
"synopsis" may belong to another edition of this title.
Defending Your Digital Assets is a comprehensive manual dealing with data security in the context of our increasingly computerised society. More than a good read, it is a programme of defensive measures and good practice when dealing with your information and computers. It features excellent, clinical and frankly chilling portraits of the crimes and criminals that constantly endanger the security of our information, and provides insightful little chapters (and a very good appendix) discussing technologies that have developed during the decades-long war waged against digital criminals and info-terrorists.
The approach is practical rather than alarmist, with numerous case studies included. While the authors clearly delineate the vulnerabilities of the systems that serve us, and the inevitability of attacks by the new criminals, they go much further. The book outlines defensive steps to be considered by each of us, from risk assessment through to legislation, pausing along the way to evaluate and elucidate both hardware and software technologies that have been employed in the battle.
The reading level varies significantly through the book, and the non-technician may well find some sections too involved. But there is plenty of meat everywhere, and even those who have to skip some portions are likely to come away with a good deal of technical knowledge as a bonus. One practical section helps readers create a tutorial on security policy awareness. The index is a pleasant surprise--a work of near perfection. Along with the appendices (which among other delicacies have capsule histories of various security technologies) it makes this a useful reference book as well as a level-headed guide through a problem zone.--Wilf Hey
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Companies, 2000. Paperback. Book Condition: New. Bookseller Inventory # DADAX0072122854
Book Description McGraw-Hill Companies, 2000. Paperback. Book Condition: New. Bookseller Inventory # P110072122854
Book Description McGraw-Hill Companies. PAPERBACK. Book Condition: New. 0072122854 New Condition. Bookseller Inventory # NEW6.1032639
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800721228551.0