Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterAbstract only
1 - Where To Start
Pages 1-4 - Book chapterAbstract only
2 - Security And The PC
Pages 5-30 - Book chapterAbstract only
3 - What Motivates A Hacker?
Pages 31-34 - Book chapterAbstract only
4 - Tricks That Hackers Use
Pages 35-40 - Book chapterAbstract only
5 - The Manager's First Tasks
Pages 41-50 - Book chapterAbstract only
6 - If You Suspect A Security Breach
Pages 51-54 - Book chapterAbstract only
7 - Employing A Security Manager
Pages 55-60 - Book chapterAbstract only
8 - Backup
Pages 61-74 - Book chapterAbstract only
9 - Viruses
Pages 75-84 - Book chapterAbstract only
10 - Access Control
Pages 85-96 - Book chapterAbstract only
11 - Secure Erasure
Pages 97-98 - Book chapterAbstract only
12 - Preventing Hardware Theft
Pages 99-100 - Book chapterAbstract only
13 - Controlling Software Piracy
Pages 101-108 - Book chapterAbstract only
14 - Encryption
Pages 109-112 - Book chapterAbstract only
15 - Security For Applications Packages
Pages 113-118 - Book chapterAbstract only
16 - Insurance
Pages 119-122 - Book chapterAbstract only
17 - Software Development
Pages 123-128 - Book chapterAbstract only
18 - Troubleshooting
Pages 129-134 - Book chapterAbstract only
19 - Considerations For Networks
Pages 135-148 - Book chapterAbstract only
20 - Current UK Legislation
Pages 149-154 - Book chapterAbstract only
21 - Resource Guide
Pages 155-176 - Book chapterNo access
Index
Pages 177-182
About the book
Description
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.
Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.
Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.
UNIQUE FEATURES INCLUDE:
– Totally PC and LAN specific
– Practical tips and guidance
– Comprehensive coverage of the topic
– Unique action sheets for immediate implementation
– Step–by– step coverage, easy to read, with limited technical jargon
WHO SHOULD READ THIS GUIDE:
– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.
– Senior managers who wish to ensure that data on their employees PC's is safe at all times.
– Managers with little computing or security experience who wish to implement a security policy throughout an organization.
Please note this is a Short Discount publication.
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.
Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.
Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.
UNIQUE FEATURES INCLUDE:
– Totally PC and LAN specific
– Practical tips and guidance
– Comprehensive coverage of the topic
– Unique action sheets for immediate implementation
– Step–by– step coverage, easy to read, with limited technical jargon
WHO SHOULD READ THIS GUIDE:
– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.
– Senior managers who wish to ensure that data on their employees PC's is safe at all times.
– Managers with little computing or security experience who wish to implement a security policy throughout an organization.
Please note this is a Short Discount publication.
Details
ISBN
978-1-85617-163-2
Language
English
Published
1992
Copyright
Copyright © 1992 Elsevier Ltd. All rights reserved.
Imprint
Elsevier Science