| 000 | 00906pamuu22002894a 4500 | |
| 001 | 000000706378 | |
| 005 | 20010529105621 | |
| 008 | 000424s2000 nju 001 0 eng | |
| 010 | ▼a 00032686 | |
| 015 | ▼a GBA0-44243 | |
| 020 | ▼a 0130173231 | |
| 040 | ▼a DLC ▼c DLC ▼d C#P ▼d UKM ▼d 211009 | |
| 042 | ▼a pcc | |
| 049 | 1 | ▼l 121049097 ▼f 과학 |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b P57 2000 |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b P665i | |
| 100 | 1 | ▼a Pipkin, Donald L. |
| 245 | 1 0 | ▼a Information security : ▼b protecting the global enterprise / ▼c Donald L. Pipkin. |
| 260 | ▼a Upper Saddle River, N.J. : ▼b Prentice Hall PTR, ▼c c2000. | |
| 300 | ▼a xxi, 364 p. ; ▼c 24 cm. | |
| 440 | 0 | ▼a Hewlett-Packard professional books |
| 500 | ▼a Includes index. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Data protection. |
| 650 | 0 | ▼a Information technology ▼x Security measures. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 P665i | 등록번호 121049097 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Unveiling the breadth of issues that encompass information security, this introduction to information security addresses both the business issues and the fundamental aspects of securing information. Pipkin, who works for the internet security division of Hewlett-Packard, delves into the value of information assets, the appropriate level of protection and response to a security incident, the technical process involved with building an information security design, and legal issues which require adequate protection and an appropriate response. Annotation c. Book News, Inc., Portland, OR (booknews.com)
정보제공 :
목차
CONTENTS Foreword = xvii Preface = xix About the Author = xxiii Acknowledgments = xxiv Prologue : The Future of Business = 1 Introduction : Information Security = 13 Phase Ⅰ : Inspection = 19 Chapter 1 : Resource Inventory = 27 Chapter 2 : Threat Assessment = 35 Chapter 3 : Loss Analysis = 55 Chapter 4 : Identifying Vulnerabilities = 67 Chapter 5 : Assigning Safefuards = 81 Chapter 6 : Evaluation of Current Status = 87 Phases Ⅱ : Protection = 93 Chapter 7 : Awareness = 101 Chapter 8 : Access = 111 Chapter 9 : Identification = 121 Chapter 10 : Authentication = 129 Chapter 11 : Authorization = 141 Chapter 12 : Availability = 149 Chapter 13 : Accuracy = 159 Chapter 14 : Confidentiality = 167 Chapter 15 : Accountability = 175 Chapter 16 : Administration = 183 Phases Ⅲ : Detection = 191 Chapter 17 : Intruder Types = 193 Chapter 18 : Intrusion Methods = 211 Chapter 19 : Intrusion Process = 221 Chapter 20 : Intrusion Detection Methods = 233 Phases Ⅳ : Reaction = 243 Chapter 21 : Response Plan = 249 Chapter 22 : Incident Determination = 255 Chapter 23 : Incident Notification = 263 Chapter 24 : Incident Containment = 271 Chapter 25 : Assissing the Damage = 277 Chapter 26 : Incident Recovery = 283 Chapter 27 : Automated Response = 291 Phase Ⅴ : Reflection = 297 Chapter 28 : Inclident Documentation = 301 Chapter 29 : Incident Evaluation = 323 Chapter 30 : Public Relations = 331 Chapter 31 : Legal Prosecution = 337 Epilogue : The future of Business = 347
