书目名称 | Computer Insecurity | 副标题 | Risking the System | 编辑 | Steven Furnell | 视频video | http://file.papertrans.cn/234/233590/233590.mp4 | 概述 | Rather than discussing the various technologies available to combat security intrusions, the book concerns itself with clearly explaining the vulnerabilities inherent to computer systems, thus giving | 图书封面 |  | 描述 | .Many existing titles provide introductions to security concepts and technologies. However, they are typically presented in the style of either academic textbooks or ‘how to’ guides. A business manager, for example, will be more interested in the problems that he may face, and their impact, before being told about the technological solutions. ..The comprehensively researched text makes reference to many real-life examples to illustrate the points being made, which help to provide evidence of security incidents and the consequences. The book helps to answer the question of why we, particularly if working in corporate roles, should care about IT security, by presenting examples of how insecure systems can be open to exploitation. The aim is to instil readers with a sense of security awareness and foster a more security-conscious IT culture. The text does not focus upon the technological solutions required – it instead concentrates upon the variety of possible vulnerabilities and the likely consequences. . | 出版日期 | Book 2005 | 关键词 | Computer Security; Computer crime; IT security; Management (of Systems); Risk Assessment; Security assura | 版次 | 1 | doi | https://doi.org/10.1007/1-84628-270-5 | isbn_softcover | 978-1-85233-943-2 | isbn_ebook | 978-1-84628-270-6 | copyright | Springer-Verlag London 2005 |
The information of publication is updating
|
|