This book focuses on specific problems and solutions. It explains the many ways that LANs, including client-server databases, electronic mail and telecommunications systems, have multiplied the security concerns of corporate information managers. Hands-on hardware, software and online access requirements are described in detail, with emphasis on planning for and managing LAN security risks. Topics covered include: defining and identifying threats; preventitive and corrective control methods; managing risk - cost/benefit analysis; administrative and organizational security; software validation and security; applying hardware and software controls; and future LAN security risks. Real-world examples and security checklists are also included.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This book focuses on specific problems and solutions. It explains the many ways that LANs, including client-server databases, electronic mail and telecommunications systems, have multiplied the security concerns of corporate information managers. Hands-on hardware, software and online access requirements are described in detail, with emphasis on planning for and managing LAN security risks. Topics covered include: defining and identifying threats; preventitive and corrective control methods; managing risk - cost/benefit analysis; administrative and organizational security; software validation and security; applying hardware and software controls; and future LAN security risks. Real-world examples and security checklists are also included.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.