did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780072122855

Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves

by
  • ISBN13:

    9780072122855

  • ISBN10:

    0072122854

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2000-03-01
  • Publisher: MCGRAW HILL BOOK COMPANY
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99

Summary

Offers a guide to defending your digital assets against all manner of threats, whatever their motivation or source. Discusses the growing vulnerability of digital information and the importance of protecting of this information. Softcover.

Author Biography

Daniel J. Ryan is currently an Adjunct Professor of Information Security and Internet Law for George Washington University and James Madison University.

Table of Contents

Part I: Digital Espionage, Warfare and Information Security (INFOSEC).

Chapter 1: Introduction to Digital Espionage.

Chapter 2: Foundations of Information Security (INFOSEC).

Part II: Infosec Concepts.

Chapter 3: Risk Management and Architecture of Information Security (INFOSEC).

Chapter 4: Information Security Policy.

Chapter 5: Privacy in a Knowlede-Based Economy.

Chapter 6: Security Verification of Systems and Networks.

Part III: Practical Countermeasures.

Chapter 7: Cryptography.

Chapter 8: Access Controls--Two Views.

Chapter 9: Digital Signatures and Cetification Authorities--Technology, Policy, and Legal Issues.

Chapter 10: Permissions Management: Identification, Authentication, and Authorization (PMIAA).

Chapter 11: Virtual Private Networks.

Chapter 12: Biometric Countermeasures.

Part IV: Enterprise Continuity Planning.

Chapter 13: Before the Attack: Protect and Detect.

Chapter 14: During and After the Attack--Special Consideration--The Web Server.

Part V: Order of Battle.

Chapter 15: The Big Picture.

Chapter 16: Information Warfare.

Chapter 17: Information Warfare Weapons, Intelligence, and the Cyberspace Environment.

Chapter 18: Methods of Employment.

Chapter 19: Public Key Infrastructure: Building Trust Online.

Chapter 20: Cryptography Politics: Encryption Export Law and Its Impact on U.S. Industry.

Appendix A: The Information Technology Revolution.

Appendix B: Definitions of Electronic Signatures in Enacted State Legislation.

Appendix C: Enacted Legislation Authorizing the Use of Electronic Images.

Appendix D: Policy Initiatives--United States.

Appendix E: International--35 Countries and Political Entities Enact Digital Signature Legislation.

Appendix F: Bernstein and the Encryption Debate.

Appendix G: VPN Comparisons.

Appendix H: Liability of Certificate Auhorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislation.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program