- Full Description
Many existing titles provide introductions to security concepts and technologies. However, they are typically presented in the style of either academic textbooks or ‘how to’ guides. A business manager, for example, will be more interested in the problems that he may face, and their impact, before being told about the technological solutions. The comprehensively researched text makes reference to many real-life examples to illustrate the points being made, which help to provide evidence of security incidents and the consequences. The book helps to answer the question of why we, particularly if working in corporate roles, should care about IT security, by presenting examples of how insecure systems can be open to exploitation. The aim is to instil readers with a sense of security awareness and foster a more security-conscious IT culture. The text does not focus upon the technological solutions required – it instead concentrates upon the variety of possible vulnerabilities and the likely consequences.
- Table of Contents
Table of Contents
- The problem of IT insecurity.
- The need to raise awareness.
- Common failings that compromise security.
- The widespread nature of vulnerability.
- Attack and exploitation of IT systems.
- Responses from the security industry.
- Final thoughts.
Please Login to submit errata.No errata are currently published