Information technology security fundamentals
Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that incre...
Saved in:
Main Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
New York, New York (222 East 46th Street, New York, NY 10017) :
Business Expert Press,
2016.
|
Edition: | First edition. |
Series: | Information systems collection.
|
Subjects: | |
ISBN: | 9781606499177 |
Physical Description: | 1 online zdroj (xiv, 157 stran). |
LEADER | 04090cam a2200613 i 4500 | ||
---|---|---|---|
001 | 91110 | ||
003 | CZ ZlUTB | ||
005 | 20240914105519.0 | ||
006 | m o d | ||
007 | cr |n | ||
008 | 151125s2016 nyu fo 001 0 eng d | ||
020 | |a 9781606499177 |q (ebook) | ||
035 | |a (OCoLC)930531034 |z (OCoLC)925286481 |z (OCoLC)925497359 |z (OCoLC)940512240 | ||
040 | |a NYBEP |b eng |e rda |e pn |c NYBEP |d OCLCO |d N$T |d IDEBK |d YDXCP |d CDX |d OCLCF |d OCLCQ |d OCLCO |d EBLCP |d CUS |d UPM |d MERUC |d UAB |d OTZ |d OCLCQ |d IDB |d U3W |d OCLCA |d BUF |d OCLCQ |d EZ9 | ||
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
080 | |a 004.056 |2 MRF | ||
080 | |a 004.6.056.5 |2 MRF | ||
080 | |a 004.7.056 |2 MRF | ||
080 | |a 003.26 |2 MRF | ||
080 | |a (048.8) |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
100 | 1 | |a Sagers, Glen, |e author. | |
245 | 1 | 0 | |a Information technology security fundamentals / |c Glen Sagers, Bryan Hosack. |
250 | |a First edition. | ||
264 | 1 | |a New York, New York (222 East 46th Street, New York, NY 10017) : |b Business Expert Press, |c 2016. | |
300 | |a 1 online zdroj (xiv, 157 stran). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Information systems collection, |x 2156-6593 | |
504 | |a Obsahuje bibliografické odkazy (stran 147-152) a index. | ||
520 | 3 | |a Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that increase security, and some that do not do as well, but overall, the best defense is to create a culture of security in the organization. Such a culture makes each member ask themselves what security implications an action will have. The culture extends from someone at reception deciding to whether to admit a visitor to upper management determining whether a strategic alliance with another firm which links their corporate information systems. The same principles that guide IT security in the enterprise guide smaller organizations and individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn on a firewall, and have antivirus software. Personal information should be safeguarded by individuals, and by the firms entrusted with it. As organizations and people develop security plans, and put the technical pieces in place, a system can emerge that is greater than the sum of its parts. Improving computing security really means education, whether of oneself, one's employees, or one's family. Thinking "security first" may seem paranoid, but in today's world, experience shows that it reflects reality. | |
500 | |a Title from PDF title page (viewed on November 25, 2015). | ||
590 | |a eBooks on EBSCOhost |b All EBSCO eBooks | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity | ||
650 | 0 | 7 | |a počítačová bezpečnost |7 ph165952 |2 czenas |
650 | 0 | 7 | |a ochrana dat |7 ph123657 |2 czenas |
650 | 0 | 7 | |a zabezpečení počítačových sítí |7 ph127513 |2 czenas |
650 | 0 | 7 | |a kryptografie |7 ph127774 |2 czenas |
650 | 0 | 9 | |a computer security |2 eczenas |
650 | 0 | 9 | |a data protection |2 eczenas |
650 | 0 | 9 | |a computer network security |2 eczenas |
650 | 0 | 9 | |a cryptography |2 eczenas |
655 | 7 | |a monografie |7 fd132842 |2 czenas | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a monographs |2 eczenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Hosack, Bryan, |e author. | |
776 | 0 | 8 | |i Print version: |z 9781606499160 |
830 | 0 | |a Information systems collection. |x 2156-6593 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1080234&authtype=ip,shib&custid=s3936755 |y Plný text |
992 | |a BK |c EBOOK-TN |c EBSCO | ||
999 | |c 91110 |d 91110 | ||
993 | |x NEPOSILAT |y EIZ |