Bezpieczeństwo systemu informatycznego stało się obowiązkiem całego personelu firmy, nie tylko administratorów IT. Różnorodność metod ataków oraz narzędzi sprawia, że każdy pracownik, od prezesa po stażystę, musi być zaangażowany w ochronę zasobów. Kluczowe jest systematyczne podejście i kontrola, co nie jest łatwe do zrealizowania. Polityka bezpieczeństwa powinna być zintegrowana z innymi elementami strategii przedsiębiorstwa i regularnie aktualizowana, aby nadążyć za szybko rozwijającymi się technikami ataków. Książka ta, będąca drugim tomem podręcznika o projektowaniu, wdrażaniu i utrzymywaniu systemów bezpieczeństwa, porusza różnorodne zagadnienia, w tym zarządzanie bezpieczeństwem, algorytmy kryptograficzne oraz bezpieczeństwo sieci. Zawiera różne podejścia do oceny ryzyka i tworzenia planów reagowania na zagrożenia, w tym klęski żywiołowe. Skupia się na zapobieganiu szkodom wyrządzanym przez ludzi oraz reagowaniu na incydenty. W przystępny sposób wyjaśnia standardy bezpieczeństwa sieci bezprzewodowych i systemów operacyjnych. Książka wzbogacona jest o studia przypadków, pytania sprawdzające oraz projekty, koncentrując się na zarządzaniu bezpieczeństwem i ryzykiem IT.
William Stallings Pořadí knih






- 2023
- 2023
Zapewnienie bezpieczeństwa systemu informatycznego to dzisiaj ogromne wyzwanie, w którym administratorzy i napastnicy prowadzą nieustanny wyścig. Agresorzy korzystają z różnorodnych narzędzi i działają w sposób nieprzewidywalny, co sprawia, że każde zabezpieczenie, choć początkowo skuteczne, w końcu staje się podatne na ataki. Administratorzy muszą być w ciągłej gotowości, wykrywać próby ataku i neutralizować je, a także nieustannie aktualizować swoją wiedzę. Ta książka to zaktualizowane wydanie podręcznika dla projektantów systemów i administratorów bezpieczeństwa. Zawiera omówienie zagrożeń dla systemów komputerowych i sieci, ocenę ryzyka oraz opracowanie efektywnych i przyjaznych dla użytkownika środków zaradczych. Wyjaśniono kluczowe zasady utrzymania bezpieczeństwa systemu oraz ich znaczenie. Przedstawiono metody projektowe spełniające wymagania bezpieczeństwa, omówiono istotne standardy oraz zilustrowano zagadnienia praktycznymi przykładami. Najważniejsze tematy to zasady bezpieczeństwa i ich wdrożenie, bezpieczeństwo oprogramowania i infrastruktury, elementy kryptografii, praca administratora bezpieczeństwa oraz cyberobrona.
- 2018
- 2017
For one- or two-semester undergraduate courses in operating systems for computer science, computer engineering, and electrical engineering majors An introduction to operating systems with up-to-date and comprehensive coverage Now in its 9th Edition, Operating Systems: Internals and Design Principles provides a comprehensive, unified introduction to operating systems topics aimed at computer science, computer engineering, and electrical engineering majors. Author William Stallings emphasises both design issues and fundamental principles in contemporary systems, while providing readers with a solid understanding of the key structures and mechanisms of operating systems. He discusses design trade-offs and the practical decisions affecting design, performance and security. The text illustrates and reinforces design concepts, tying them to real-world design choices with case studies in Linux, UNIX, Android, and Windows 10. With an unparalleled degree of support for integrating projects into the course, plus comprehensive coverage of the latest trends and developments in operating systems, including cloud computing and the Internet of Things (IoT), the text provides everything students and instructors need to keep pace with a complex and rapidly changing field. The 9th Edition has been extensively revised and contains new material, new projects, and updated chapters.
- 2008
Computer Security. Principles and Practice
- 798 stránek
- 28 hodin čtení
In recent years, the need for education in computer security & related topics has grown dramatically & is essential for anyone studying computer science or computer engineering. This text provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.
- 2007
This book is the definitive guide to SNMP-based network and internetwork management for network administrators, managers, and designers. Concise, focusing on practical issues, and completely up to date, it covers SNMPv1, SNMPv2, and the most recent SNMPv3, as well as RMON1 and RMON2 - all of which are currently deployed in LANs and WANs. With this book, you will be better equipped to determine your network management needs, gain insight into design issues, and obtain the necessary understanding to evaluate available SNMP-based products. The author presents helpful background information, including an overview of network management requirements and an explanation of fundamentals such as network management architecture; performance, fault, and accounting monitoring; and configuration and security control.
- 2003
Cryptography and Network Security
- 696 stránek
- 25 hodin čtení
For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field.
- 2001
Wireless Communications & Networks
- 596 stránek
- 21 hodin čtení
For one-semester, undergraduate/graduate-level courses in Advanced Networking, Wireless Communications, Wireless Data Communications, and Wireless Technology, in departments of Electrical Engineering, Computer Science, Information Science, and Computer Engineering. This comprehensive, well-organized text covers wireless communication and networks, and the rapidly growing associated technologies the most exciting areas in the overall communications field. It explores the key topics in the following general categories: technology and architecture, network type, design approaches, and applications. An emphasis on specific wireless standards reflects the importance of such standards in defining the available products and future research directions in this field. *Coverage of basic networking concepts in Part One and Appendices - appropriate for students with little or no background in data communications. *Consistent discussion of technology and architecture - illustrates how a small collection of ingredients - including frequency band, signal encoding techniques, error correction technique, and network architecture - characterize and differentiate wireless communication and networking
- 2000
This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and as a valuable reference or tutorial.It offers a large section on the discipline of cryptography -- covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. Other topics include IP, web, and network management security, firewalls, and intruders and viruses.
- 1995
Offering a comprehensive and unified introduction to operating systems, this book provides students with a foundation in key mechanisms of operating systems as well as a look at design issues highlighting the tradeoffs and decisions involved in OS design. Building on fundamental principles, the book presents recent developments such as threads, real-time systems, multiprocessor scheduling, process migrations and security. Throughout, Windows NT, UNIX, and IBM MVS are used as running illustrative examples of actual operating systems. operating systems - reflecting current trends in the field and highlighting how distributed operating systems concepts build on concepts found in traditional operating systems. It also provides an internet mailing list, and discusses object-oriented design techniques.




