The Virtual Bookcase : Shelf Computer security
Security of computer systems
Shelf parts : First Previous Next Last
Book descriptionGet full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
I want to add my review for this book!
Reviews (2) and details of Wireless Security
Review:
The primary audience described in the introduction seems to be
security professionals. However, system administrators, technology
managers, and CIOs are mentioned as well. The attempt at breadth of
coverage usually does not bode well in works like these.
Chapter one discusses an information security model based upon the
business (and other) objectives of the institution in question. While
valid as far as it goes, and even possibly helpful when formulating
security policy, this by no means provides a structure from which to
view either security policy or procedures, let alone implement a
complex set of controls. The widget company, beloved of management
writers, is described in chapter two. For the purposes of assessing
security in re...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Microsoft Windows Nt 4.0 Security, Audit, and Control (Microsoft Technical Reference)
Book descriptionYour computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference.
I want to add my review for this book!
Reviews (2) and details of Windows Nt Security Guide
Book descriptionAdministrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirementsFinally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast!Once security policies are written, they must be treated as living docume...
Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Writing Information Security Policies
Shelf parts : First Previous Next Last