Computer Security: 20 Things Every Employee Should Know

Nonfiction, Computers, Networking & Communications, General Computing
Cover of the book Computer Security: 20 Things Every Employee Should Know by Ben Rothke, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ben Rothke ISBN: 9780071490306
Publisher: McGraw-Hill Education Publication: June 5, 2006
Imprint: McGraw-Hill Education Language: English
Author: Ben Rothke
ISBN: 9780071490306
Publisher: McGraw-Hill Education
Publication: June 5, 2006
Imprint: McGraw-Hill Education
Language: English

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

More books from McGraw-Hill Education

Cover of the book Anesthesia Unplugged, Second Edition by Ben Rothke
Cover of the book McGraw-Hill's NEC 2014 Grounding and Earthing Handbook by Ben Rothke
Cover of the book The Meltdown Years: The Unfolding of the Global Economic Crisis by Ben Rothke
Cover of the book INVESTING IN MUNICIPAL BONDS: How to Balance Risk and Reward for Success in Today’s Bond Market by Ben Rothke
Cover of the book Schaum's Outline of Probability, Random Variables, and Random Processes, 3/E (Enhanced Ebook) by Ben Rothke
Cover of the book Maternal Medicine by Ben Rothke
Cover of the book 5 Steps to a 5: AP Calculus AB 2018 by Ben Rothke
Cover of the book Easy Mathematics Step-by-Step by Ben Rothke
Cover of the book Thoracic Anesthesia by Ben Rothke
Cover of the book Social Work In The Youth Justice System: A Multidisciplinary Perspective by Ben Rothke
Cover of the book Money: How the Destruction of the Dollar Threatens the Global Economy – and What We Can Do About It by Ben Rothke
Cover of the book Ductile Design of Steel Structures, 2nd Edition by Ben Rothke
Cover of the book Stroke Prevention, Treatment, and Rehabilitation by Ben Rothke
Cover of the book Becoming a Successful Manager, Second Edition by Ben Rothke
Cover of the book Forex DeMYSTiFieD: A Self-Teaching Guide by Ben Rothke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy