Enterprise security-(E-BOOK) the manager's defense guide / David Leon Clark.

By: Clark, David LeonSeries: Addison-Wesley information technology seriesPublisher: Boston : Addison-Wesley, c2003Description: xx, 264 p. : ill. ; 24 cmISBN: 020171972XSubject(s): Computer security | Electronic commerce -- Security measures | Information warfare | E-BOOKDDC classification: 005.8
Contents:
Ch. 1What is E-Business?(Page-3) Ch. 2What is E-Security? (Page-23) Ch. 3The Malicious Opponents of E-Business(Page-35) Pt. IIProtecting Information Assets in an Open Society(Page-45) Ch. 4A New Theater of Battle(Page-47) Ch. 5Reempowering Information Technology in the New Arms Race(Page-63) Pt. IIIWaging War for Control of Cyberspace(Page-83) Ch. 6Attacks by Syntax: Hacker and Cracker Tools(Page-85) Ch. 7Attacks by Automated Command Sequences(Page-101) Ch. 8Countermeasures and Attack Prevention(Page-113) Ch. 9Denial-of-Service Attacks(Page-129) Ch. 10Creating a Functional Model for E-Security(Page-143) Ch. 11Building a Security Architecture(Page-185) Pt. IVActive Defense Mechanisms and Risk Management(Page-209) Ch. 12Vulnerability Management(Page-211) Ch. 13Risk Management(Page-219)
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 005.8 CLA (Browse shelf) Link to resource Available MCSEB-1374
Total holds: 0

Ch. 1What is E-Business?(Page-3) Ch. 2What is E-Security? (Page-23) Ch. 3The Malicious Opponents of E-Business(Page-35) Pt. IIProtecting Information Assets in an Open Society(Page-45) Ch. 4A New Theater of Battle(Page-47) Ch. 5Reempowering Information Technology in the New Arms Race(Page-63) Pt. IIIWaging War for Control of Cyberspace(Page-83) Ch. 6Attacks by Syntax: Hacker and Cracker Tools(Page-85) Ch. 7Attacks by Automated Command Sequences(Page-101) Ch. 8Countermeasures and Attack Prevention(Page-113) Ch. 9Denial-of-Service Attacks(Page-129) Ch. 10Creating a Functional Model for E-Security(Page-143) Ch. 11Building a Security Architecture(Page-185) Pt. IVActive Defense Mechanisms and Risk Management(Page-209) Ch. 12Vulnerability Management(Page-211) Ch. 13Risk Management(Page-219)

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.