Computer Security: 20 Things Every Employee Should Know

Author:   Ben Rothke
Publisher:   McGraw-Hill Education - Europe
Edition:   2nd edition
ISBN:  

9780072262827


Pages:   64
Publication Date:   16 September 2006
Format:   Spiral bound
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $20.99 Quantity:  
Add to Cart

Share |

Computer Security: 20 Things Every Employee Should Know


Add your own review!

Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include: Phishing and spyware Identity theft Workplace access Passwords Viruses and malware Remote access E-mail Web surfing and Internet use Instant messaging Personal firewalls and patches Hand-held devices Data backup Management of sensitive information Social engineering tactics Use of corporate resources Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

Full Product Details

Author:   Ben Rothke
Publisher:   McGraw-Hill Education - Europe
Imprint:   Osborne/McGraw-Hill
Edition:   2nd edition
Dimensions:   Width: 14.70cm , Height: 0.50cm , Length: 22.90cm
Weight:   0.103kg
ISBN:  

9780072262827


ISBN 10:   0072262826
Pages:   64
Publication Date:   16 September 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Spiral bound
Publisher's Status:   Unknown
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Chapter 1: Computer Security: 20 Things Every Employee Should Know Chapter 2: Beware of phishing and spyware Chapter 3: Protect your identity Chapter 4: Be responsible and be aware Chapter 5: Choose your password wisely Chapter 6: Practice safe access Chapter 7: Protect your work outside the office Chapter 8: Reduce e-mail risks Chapter 9: Suspect e-mail hoaxes Chapter 10: Work wisely with the Web Chapter 11: Avoid Internet dangers Chapter 12: Master instant messaging Chapter 13: Use firewalls and patches Chapter 14: Use PDAs safely Chapter 15: Back up and secure data Chapter 16: Manage data wisely Chapter 17: Secure your workspace Chapter 18: Beware of social engineers Chapter 19: Use corporate resources only for work Chapter 20: Call the experts when things go wrong Chapter 21: Keep things in context Appendix: Glossary of computer security Terms About the author

Reviews

Author Information

Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List