HOME > 상세정보

상세정보

Information security : protecting the global enterprise

Information security : protecting the global enterprise (2회 대출)

자료유형
단행본
개인저자
Pipkin, Donald L.
서명 / 저자사항
Information security : protecting the global enterprise / Donald L. Pipkin.
발행사항
Upper Saddle River, N.J. :   Prentice Hall PTR,   c2000.  
형태사항
xxi, 364 p. ; 24 cm.
총서사항
Hewlett-Packard professional books
ISBN
0130173231
일반주기
Includes index.  
일반주제명
Computer security. Data protection. Information technology -- Security measures.
000 00906pamuu22002894a 4500
001 000000706378
005 20010529105621
008 000424s2000 nju 001 0 eng
010 ▼a 00032686
015 ▼a GBA0-44243
020 ▼a 0130173231
040 ▼a DLC ▼c DLC ▼d C#P ▼d UKM ▼d 211009
042 ▼a pcc
049 1 ▼l 121049097 ▼f 과학
050 0 0 ▼a QA76.9.A25 ▼b P57 2000
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b P665i
100 1 ▼a Pipkin, Donald L.
245 1 0 ▼a Information security : ▼b protecting the global enterprise / ▼c Donald L. Pipkin.
260 ▼a Upper Saddle River, N.J. : ▼b Prentice Hall PTR, ▼c c2000.
300 ▼a xxi, 364 p. ; ▼c 24 cm.
440 0 ▼a Hewlett-Packard professional books
500 ▼a Includes index.
650 0 ▼a Computer security.
650 0 ▼a Data protection.
650 0 ▼a Information technology ▼x Security measures.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 P665i 등록번호 121049097 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Unveiling the breadth of issues that encompass information security, this introduction to information security addresses both the business issues and the fundamental aspects of securing information. Pipkin, who works for the internet security division of Hewlett-Packard, delves into the value of information assets, the appropriate level of protection and response to a security incident, the technical process involved with building an information security design, and legal issues which require adequate protection and an appropriate response. Annotation c. Book News, Inc., Portland, OR (booknews.com)


정보제공 : Aladin

목차


CONTENTS

Foreword = xvii

Preface = xix

About the Author = xxiii

Acknowledgments = xxiv

Prologue : The Future of Business = 1

Introduction : Information Security = 13

Phase Ⅰ : Inspection = 19

 Chapter 1 : Resource Inventory = 27

 Chapter 2 : Threat Assessment = 35

 Chapter 3 : Loss Analysis = 55

 Chapter 4 : Identifying Vulnerabilities = 67

 Chapter 5 : Assigning Safefuards = 81

 Chapter 6 : Evaluation of Current Status = 87

Phases Ⅱ : Protection = 93

 Chapter 7 : Awareness = 101

 Chapter 8 : Access = 111

 Chapter 9 : Identification = 121

 Chapter 10 : Authentication = 129

 Chapter 11 : Authorization = 141

 Chapter 12 : Availability = 149

 Chapter 13 : Accuracy = 159

 Chapter 14 : Confidentiality = 167

 Chapter 15 : Accountability = 175

 Chapter 16 : Administration = 183

Phases Ⅲ : Detection = 191

 Chapter 17 : Intruder Types = 193

 Chapter 18 : Intrusion Methods = 211

 Chapter 19 : Intrusion Process = 221

 Chapter 20 : Intrusion Detection Methods = 233

Phases Ⅳ : Reaction = 243

 Chapter 21 : Response Plan = 249

 Chapter 22 : Incident Determination = 255

 Chapter 23 : Incident Notification = 263

 Chapter 24 : Incident Containment = 271

 Chapter 25 : Assissing the Damage = 277

 Chapter 26 : Incident Recovery = 283

 Chapter 27 : Automated Response = 291

Phase Ⅴ : Reflection = 297

 Chapter 28 : Inclident Documentation = 301

 Chapter 29 : Incident Evaluation = 323

 Chapter 30 : Public Relations = 331

 Chapter 31 : Legal Prosecution = 337

Epilogue : The future of Business = 347



관련분야 신착자료

Harvard Business Review (2025)