Text
Information Technology Security Handbook
Contents
Part 1. Introduction
Chapter 1. IT Security in the Digital Age
Part 2. Security for Individuals
Chapter 1. Introduction to Security for Individuals
Chapter 2. Understanding and Addressing Security
Chapter 3. Keeping Your Computer and Data Secure
Chapter 4. Keeping Your Operating System and Application Software Secure
Chapter 5. Malicious Software
Chapter 6. Securing Services Over Networks
Chapter 7. Tools to Enhance Security
Chapter 8. Platform Specific Issues
Addendum 1. Introduction to Encoding and Encryption
Addendum 2. TCP/IP
Addendum 3. Mini-Glossary of Technical Terms
Part 3. Security for Organizations
Chapter 1. Introduction
Chapter 2. Overview of E-Security Risk Mitigation
Chapter 3. Risk Evaluation and Loss Analysis
Chapter 4. Planning Your Security Needs
Chapter 5. Organizational Security Policy and Prevention
Chapter 6. Personnel Security
Chapter 7. Security Outsourcing
Chapter 8. Privacy Policies Legislation, and Government Regulation
Chapter 9. Computer Crime
Chapter 10. Mobile Risk Management
Chapter 11. Best Practices: Building Security Culture
Chapter 12. General Rules for Computer Users
Chapter 13. Global Dialogues on Security
Part 4. Information Security and Government Policies
Chapter 1. Introduction
Chapter 2. Protecting Government Systems
Chapter 3. The Role of Law and Government Policy vis a Vis The Private Sector
Chapter 4. Government Cyber-Security Policies
Part 5. IT Security for Technical Administrators
Chapter 1. Background
Chapter 2. Security for Administrators
Chapter 3. Physical Security
Chapter 4. Information Security
Chapter 5. Isdentification and Authentication
Chapter 6. Server Security
Chapter 7. Network Security
Chapter 8. Attacks and Defenses
Chapter 9. Detecting and Managing a Break-In
Chapter 10. System-Specific Guidelines
No other version available