• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Computer Security: 20 Things Every Employee Should Know

    Computer Security: 20 Things Every Employee Should Know by Rothke, Ben;

    Series: NETWORKING & COMM - OMG;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 12.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        6 205 Ft (5 910 Ft + 5% VAT)
      • Discount 10% (cc. 621 Ft off)
      • Discounted price 5 585 Ft (5 319 Ft + 5% VAT)

    6 205 Ft

    Availability

    cancelled

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 2
    • Publisher McGraw Hill
    • Date of Publication 16 September 2006

    • ISBN 9780072262827
    • Binding Spiral bound
    • No. of pages64 pages
    • Size 228x147x5 mm
    • Weight 103 g
    • Language English
    • 0

    Categories

    Short description:

    Securing corporate resources and data in the workplace is everyone?s responsibility. Corporate IT security strategies are only as good as the employee?s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you?ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

    • Phishing and spyware
    • Identity theft
    • Workplace access
    • Passwords
    • Viruses and malware
    • Remote access
    • E-mail
    • Web surfing and Internet use
    • Instant messaging
    • Personal firewalls and patches
    • Hand-held devices
    • Data backup
    • Management of sensitive information
    • Social engineering tactics
    • Use of corporate resources

    Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi?ence in the area of information systems security and privacy.

    More

    Long description:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    Securing corporate resources and data in the workplace is everyone?s responsibility. Corporate IT security strategies are only as good as the employee?s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you?ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

    • Phishing and spyware
    • Identity theft
    • Workplace access
    • Passwords
    • Viruses and malware
    • Remote access
    • E-mail
    • Web surfing and Internet use
    • Instant messaging
    • Personal firewalls and patches
    • Hand-held devices
    • Data backup
    • Management of sensitive information
    • Social engineering tactics
    • Use of corporate resources

    Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi?ence in the area of information systems security and privacy.



    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    Securing corporate resources and data in the workplace is everyone?s responsibility. Corporate IT security strategies are only as good as the employee?s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you?ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

    • Phishing and spyware
    • Identity theft
    • Workplace access
    • Passwords
    • Viruses and malware
    • Remote access
    • E-mail
    • Web surfing and Internet use
    • Instant messaging
    • Personal firewalls and patches
    • Hand-held devices
    • Data backup
    • Management of sensitive information
    • Social engineering tactics
    • Use of corporate resources

    Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi?ence in the area of information systems security and privacy.

    More

    Table of Contents:

    Chapter 1: Computer Security: 20 Things Every Employee Should Know
    Chapter 2: Beware of phishing and spyware
    Chapter 3: Protect your identity
    Chapter 4: Be responsible and be aware
    Chapter 5: Choose your password wisely
    Chapter 6: Practice safe access
    Chapter 7: Protect your work outside the office
    Chapter 8: Reduce e-mail risks
    Chapter 9: Suspect e-mail hoaxes
    Chapter 10: Work wisely with the Web
    Chapter 11: Avoid Internet dangers
    Chapter 12: Master instant messaging
    Chapter 13: Use firewalls and patches
    Chapter 14: Use PDAs safely
    Chapter 15: Back up and secure data
    Chapter 16: Manage data wisely
    Chapter 17: Secure your workspace
    Chapter 18: Beware of social engineers
    Chapter 19: Use corporate resources only for work
    Chapter 20: Call the experts when things go wrong
    Chapter 21: Keep things in context
    Appendix: Glossary of computer security Terms
    About the author

    More
    0