Computer Security: 20 Things Every Employee Should Know

Nonfiction, Computers, Networking & Communications, General Computing
Cover of the book Computer Security: 20 Things Every Employee Should Know by Ben Rothke, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ben Rothke ISBN: 9780071490306
Publisher: McGraw-Hill Education Publication: June 5, 2006
Imprint: McGraw-Hill Education Language: English
Author: Ben Rothke
ISBN: 9780071490306
Publisher: McGraw-Hill Education
Publication: June 5, 2006
Imprint: McGraw-Hill Education
Language: English

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

More books from McGraw-Hill Education

Cover of the book Nanoelectronics: Nanowires, Molecular Electronics, and Nanodevices by Ben Rothke
Cover of the book American Landlord Law: Everything U Need to Know About Landlord-Tenant Laws by Ben Rothke
Cover of the book McGraw-Hill Education Social Studies Workbook for the GED Test, Second Edition by Ben Rothke
Cover of the book Cinderella Was a Liar: The Real Reason You Can’t Find (or Keep) a Prince by Ben Rothke
Cover of the book BusinessObjects XI (Release 2): The Complete Reference by Ben Rothke
Cover of the book Wireless Network Security A Beginner's Guide by Ben Rothke
Cover of the book Physical Therapy Case Files, Sports by Ben Rothke
Cover of the book How to Do Everything by Ben Rothke
Cover of the book Learn Aspen Plus in 24 Hours by Ben Rothke
Cover of the book Firebrands: Building Brand Loyalty in the Internet Age by Ben Rothke
Cover of the book PRMIA Guide to the Energy Markets by Ben Rothke
Cover of the book What is Lean Six Sigma by Ben Rothke
Cover of the book PERFECT POWER: How the Microgrid Revolution Will Unleash Cleaner, Greener, More Abundant Energy by Ben Rothke
Cover of the book Practice Makes Perfect Advanced ESL Reading and Comprehension (EBOOK) by Ben Rothke
Cover of the book Entourage 5th Edition by Ben Rothke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy