BookMooch logo
 
home browse about join login
Randall K. Nichols : Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
?



Author: Randall K. Nichols
Title: Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
Moochable copies: No copies available
Topics:
>
Published in: English
Binding: Paperback
Pages: 848
Date: 2000-01-05
ISBN: 0072122854
Publisher: McGraw-Hill Companies
Weight: 3.75 pounds
Size: 2.24 x 7.8 x 9.25 inches
Amazon prices:
$0.01used
$19.95new
Previous givers: 3 Jason Axley (USA: WA), Jason Axley (USA: WA), Jason Axley (USA: WA)
Previous moochers: 3 swapbooks (USA: NC), Cathy (USA: FL), sigwart (USA: IL)
Description: Product Description
RSA Press -- RSA is the leading developer of data encryption and cryptography in the US. RSA is synonomous with Security and encryption.
-- Advice from the pros -- This is the book that discusses how attacks occur and how to stop them before they occur! This is of interest to not only the network adminsitrator, but the CIO, LAN Manager, and anyone with valuable data on a network. This is critical information considering:
-- IDC analyst found most attacks (70% !) come from within the company or organization, not from industrial thieves or political activists.
-- No Data is Safe! Everyone from the New York Times, the US Senate, and Large ISP's, to Fortune 500 corporations and even the FBI. 50% of all networks get attacked by hackers (Source: IDC).
-- Administrators usually don't even know they are under attack! Less the 3% of all hacker attacks are even detected and less than 1% are ever reported to the FBI (Source: ComputerWorld Magazine).


Amazon.com Review
Computer security holds a unique position among information technology disciplines. Because threats to systems are so numerous and varied, you can spend years studying them (and general strategies for counteracting them) before you start to work with specific security tools. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves is a guide to computer security that remains one step back from security software itself. In place of specific how-to information, readers learn about the motives of online attackers and the strategies they use to gain unauthorized access to systems and data, plus overarching concepts like public-key cryptography. They also find out about defensive and forensic strategies for preventing attacks and limiting their potency when they occur.

The authors of this book--a cryptographer, a couple of mathematicians, and a handful of others--employ a very text-heavy presentation style that's best suited to attentive study. The prose tends to be dense and a bit academic, and certain conceptual diagrams approach inscrutability. Still, security is a complicated matter, and a simplistic treatment wouldn't be as useful. It's possible to scan the index for a topic that interests you--keystroke biometrics, say--and find a definition and a statement of pros and cons. You'll also find endnote references to more specialized works but little mention of software products that implement the ideas the authors explain. --David Wall

Topics covered: Computer and network security, including risk management, security policy, cryptography, access control, authentication, biometrics, actions to be taken during an attack, and case studies of hacking and information warfare.

URL: http://bookmooch.com/0072122854
large book cover

WISHLIST ADD >

SAVE FOR LATER >

AMAZON >

OTHER WEB SITES >

RELATED EDITIONS >

RECOMMEND >

REFRESH DATA >