Information technology security fundamentals

Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that incre...

Full description

Saved in:
Bibliographic Details
Main Authors: Sagers, Glen, (Author), Hosack, Bryan, (Author)
Format: eBook
Language: English
Published: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, 2016.
Edition: First edition.
Series: Information systems collection.
Subjects:
ISBN: 9781606499177
Physical Description: 1 online zdroj (xiv, 157 stran).

Cover

Table of contents

LEADER 04090cam a2200613 i 4500
001 91110
003 CZ ZlUTB
005 20240914105519.0
006 m o d
007 cr |n
008 151125s2016 nyu fo 001 0 eng d
020 |a 9781606499177  |q (ebook) 
035 |a (OCoLC)930531034  |z (OCoLC)925286481  |z (OCoLC)925497359  |z (OCoLC)940512240 
040 |a NYBEP  |b eng  |e rda  |e pn  |c NYBEP  |d OCLCO  |d N$T  |d IDEBK  |d YDXCP  |d CDX  |d OCLCF  |d OCLCQ  |d OCLCO  |d EBLCP  |d CUS  |d UPM  |d MERUC  |d UAB  |d OTZ  |d OCLCQ  |d IDB  |d U3W  |d OCLCA  |d BUF  |d OCLCQ  |d EZ9 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004.056  |2 MRF 
080 |a 004.6.056.5  |2 MRF 
080 |a 004.7.056  |2 MRF 
080 |a 003.26  |2 MRF 
080 |a (048.8)  |2 MRF 
080 |a (0.034.2:08)  |2 MRF 
100 1 |a Sagers, Glen,  |e author. 
245 1 0 |a Information technology security fundamentals /  |c Glen Sagers, Bryan Hosack. 
250 |a First edition. 
264 1 |a New York, New York (222 East 46th Street, New York, NY 10017) :  |b Business Expert Press,  |c 2016. 
300 |a 1 online zdroj (xiv, 157 stran). 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Information systems collection,  |x 2156-6593 
504 |a Obsahuje bibliografické odkazy (stran 147-152) a index. 
520 3 |a Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that increase security, and some that do not do as well, but overall, the best defense is to create a culture of security in the organization. Such a culture makes each member ask themselves what security implications an action will have. The culture extends from someone at reception deciding to whether to admit a visitor to upper management determining whether a strategic alliance with another firm which links their corporate information systems. The same principles that guide IT security in the enterprise guide smaller organizations and individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn on a firewall, and have antivirus software. Personal information should be safeguarded by individuals, and by the firms entrusted with it. As organizations and people develop security plans, and put the technical pieces in place, a system can emerge that is greater than the sum of its parts. Improving computing security really means education, whether of oneself, one's employees, or one's family. Thinking "security first" may seem paranoid, but in today's world, experience shows that it reflects reality. 
500 |a Title from PDF title page (viewed on November 25, 2015). 
590 |a eBooks on EBSCOhost  |b All EBSCO eBooks 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity 
650 0 7 |a počítačová bezpečnost  |7 ph165952  |2 czenas 
650 0 7 |a ochrana dat  |7 ph123657  |2 czenas 
650 0 7 |a zabezpečení počítačových sítí  |7 ph127513  |2 czenas 
650 0 7 |a kryptografie  |7 ph127774  |2 czenas 
650 0 9 |a computer security  |2 eczenas 
650 0 9 |a data protection  |2 eczenas 
650 0 9 |a computer network security  |2 eczenas 
650 0 9 |a cryptography  |2 eczenas 
655 7 |a monografie  |7 fd132842  |2 czenas 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a monographs  |2 eczenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Hosack, Bryan,  |e author. 
776 0 8 |i Print version:  |z 9781606499160 
830 0 |a Information systems collection.  |x 2156-6593 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1080234&authtype=ip,shib&custid=s3936755  |y Plný text 
992 |a BK  |c EBOOK-TN  |c EBSCO 
999 |c 91110  |d 91110 
993 |x NEPOSILAT  |y EIZ