Data Protection and Security for Personal Computers
A manager's guide to improving the confidentiality, availability and integrity of data on Personal Computers and Local Area Networks
- 200 pages
- English
- PDF
- Available on iOS & Android
Data Protection and Security for Personal Computers
A manager's guide to improving the confidentiality, availability and integrity of data on Personal Computers and Local Area Networks
About This Book
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.
Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.
Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.
UNIQUE FEATURES INCLUDE:
– Totally PC and LAN specific
– Practical tips and guidance
– Comprehensive coverage of the topic
– Unique action sheets for immediate implementation
– Step–by– step coverage, easy to read, with limited technical jargon
WHO SHOULD READ THIS GUIDE:
– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.
– Senior managers who wish to ensure that data on their employees PC's is safe at all times.
– Managers with little computing or security experience who wish to implement a security policy throughout an organization.
Please note this is a Short Discount publication.
Frequently asked questions
Information
Table of contents
- Front Cover
- Data Protection and Security for Personal Computers
- Copyright Page
- Table of Contents
- Foreword
- Introduction
- THE ULTIMATE GOAL
- Chapter 1. Where To Start
- Chapter 2. Security And The PC
- Chapter 3. What Motivates A Hacker?
- Chapter 4. Tricks That Hackers Use
- Chapter 5. The Manager's First Tasks
- Chapter 6. If You Suspect A Security Breach
- Chapter 7. Employing A Security Manager
- Chapter 8. Backup
- Chapter 9. Viruses
- Chapter 10. Access Control
- Chapter 11. Secure Erasure
- Chapter 12. Preventing Hardware Theft
- Chapter 13. Controlling Software Piracy
- Chapter 14. Encryption
- Chapter 15. Security For Applications Packages
- Chapter 16. Insurance
- Chapter 17. Software Development
- Chapter 18. Troubleshooting
- Chapter 19. Considerations For Networks
- Chapter 20. Current UK Legislation
- Chapter 21. Resource Guide
- Index