000 01444 a2200229 4500
003 Nust
005 20170207154030.0
010 _a 2002006190
020 _a020171972X
040 _cNust
082 0 0 _a005.8
100 1 _aClark, David Leon,
245 1 0 _aEnterprise security-(E-BOOK)
_bthe manager's defense guide /
_cDavid Leon Clark.
260 _aBoston :
_bAddison-Wesley,
_cc2003.
300 _axx, 264 p. :
_bill. ;
_c24 cm.
440 0 _aAddison-Wesley information technology series
505 _aCh. 1What is E-Business?(Page-3) Ch. 2What is E-Security? (Page-23) Ch. 3The Malicious Opponents of E-Business(Page-35) Pt. IIProtecting Information Assets in an Open Society(Page-45) Ch. 4A New Theater of Battle(Page-47) Ch. 5Reempowering Information Technology in the New Arms Race(Page-63) Pt. IIIWaging War for Control of Cyberspace(Page-83) Ch. 6Attacks by Syntax: Hacker and Cracker Tools(Page-85) Ch. 7Attacks by Automated Command Sequences(Page-101) Ch. 8Countermeasures and Attack Prevention(Page-113) Ch. 9Denial-of-Service Attacks(Page-129) Ch. 10Creating a Functional Model for E-Security(Page-143) Ch. 11Building a Security Architecture(Page-185) Pt. IVActive Defense Mechanisms and Risk Management(Page-209) Ch. 12Vulnerability Management(Page-211) Ch. 13Risk Management(Page-219)
650 0 _aComputer security.
650 0 _aElectronic commerce
_xSecurity measures.
650 0 _aInformation warfare.
651 _aE-BOOK
942 _2ddc
_cBK
999 _c192133
_d192133