Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Information Technology Security Handbook
Bookmark Share

Text

Information Technology Security Handbook

Sadowsky, George - Personal Name; Greenberg, Alan - Personal Name; Dempsey, James X - Personal Name; Mack, Barbara J. - Personal Name; Schwartz, Alan - Personal Name;

Contents

Part 1. Introduction
Chapter 1. IT Security in the Digital Age

Part 2. Security for Individuals
Chapter 1. Introduction to Security for Individuals
Chapter 2. Understanding and Addressing Security
Chapter 3. Keeping Your Computer and Data Secure
Chapter 4. Keeping Your Operating System and Application Software Secure
Chapter 5. Malicious Software
Chapter 6. Securing Services Over Networks
Chapter 7. Tools to Enhance Security
Chapter 8. Platform Specific Issues
Addendum 1. Introduction to Encoding and Encryption
Addendum 2. TCP/IP
Addendum 3. Mini-Glossary of Technical Terms

Part 3. Security for Organizations
Chapter 1. Introduction
Chapter 2. Overview of E-Security Risk Mitigation
Chapter 3. Risk Evaluation and Loss Analysis
Chapter 4. Planning Your Security Needs
Chapter 5. Organizational Security Policy and Prevention
Chapter 6. Personnel Security
Chapter 7. Security Outsourcing
Chapter 8. Privacy Policies Legislation, and Government Regulation
Chapter 9. Computer Crime
Chapter 10. Mobile Risk Management
Chapter 11. Best Practices: Building Security Culture
Chapter 12. General Rules for Computer Users
Chapter 13. Global Dialogues on Security

Part 4. Information Security and Government Policies
Chapter 1. Introduction
Chapter 2. Protecting Government Systems
Chapter 3. The Role of Law and Government Policy vis a Vis The Private Sector
Chapter 4. Government Cyber-Security Policies

Part 5. IT Security for Technical Administrators
Chapter 1. Background
Chapter 2. Security for Administrators
Chapter 3. Physical Security
Chapter 4. Information Security
Chapter 5. Isdentification and Authentication
Chapter 6. Server Security
Chapter 7. Network Security
Chapter 8. Attacks and Defenses
Chapter 9. Detecting and Managing a Break-In
Chapter 10. System-Specific Guidelines


Availability
#
Perpustakaan Poltek SSN 349
000 00453
Available
Detail Information
Series Title
-
Call Number
005.8 INF I
Publisher
WASHINGTON D.C : The World Bank., 2003
Collation
vi, 389 hal.; 27 cm
Language
English
ISBN/ISSN
0974788805
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
-
Specific Detail Info
-
Statement of Responsibility
George Sadowsky, dkk
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?