Bibliographic record and links to related information available from the Library of Congress catalog.
Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.
Contents Chapter 1 Introduction Chapter 2 A hacker is made Chapter 3 Preparation and Planning Chapter 4 International Laws and Standards Chapter 5 Passwords and Beyond Chapter 6 Your Information Security Policy Chapter 7 Security Awareness Training Chapter 8 Patch Management Chapter 9 Windows Workstation Security Chapter 10 Basic Server Security Chapter 11 Understanding Firewalls Chapter 12 Protecting Your Web Site Chapter 13 Wireless Networking Chapter 14 Penetration Testing & Vulnerability Scanning Chapter 15 Security Through Obscurity Chapter 16 Windows Vista Chapter 17 Email Chapter 18 The Curse of Spam Chapter 19 Viruses Chapter 20 Spyware, Adware and Diallers Chapter 21 Piracy Chapter 22 File Sharing and ?P2P? Chapter 23 Backups and Archives Chapter 24 Preventing Internet Misuse Chapter 25 Document Security Chapter 26 Data Theft Chapter 27 Encryption Chapter 28 Employees? Own Computers Chapter 29 How Hackers Use Search Engines Chapter 30 Denial of Service Attacks Chapter 31 Provisioning and Identity Management Chapter 32 Data Interception Chapter 33 Out of the Office Chapter 34 Social Engineering Chapter 35 E-Commerce Fraud Chapter 36 Intrusion Detection Systems Chapter 37 Outsourcing Chapter 38 Securing your Premises Chapter 39 Forensics Chapter 40 Planning for the Worst Chapter 41 Hardware Theft Chapter 42 Let?s Be Careful Out There
Library of Congress Subject Headings for this publication: