Cover image for Defending your digital assets against hackers, crackers, spies and thieves
Defending your digital assets against hackers, crackers, spies and thieves
Nichols, Randall K.
Personal Author:
Publication Information:
New York : McGraw-Hill, [2000]

Physical Description:
xxxv, 858 pages : illustrations ; 24 cm
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.9.A25 N528 2000 Adult Non-Fiction Central Closed Stacks

On Order



Learn to stop digital espionage-before it happens!Manage your way to security in an increasingly interconnected world. Network data has become increasingly valuable in today's public and private sectors, as has become painfully clear to those in Fortune 500 companies and to those in top branches of government who store information digitally. But exactly how safe is the informaton that is accessible from a network?According to the expert authors of Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves and RSA Security, the most trusted name in e-security, NO data is safe. In fact, digital espionage, theft and destruction occur every day, and most attacks go undetected until it is too late.This groundbreaking new work discusses the growing vulnerabilities due to interconnectivity and the importance of protecting digital information. It offers detailed explanations of how and why attacks in progress, and quickly recover business operations. This is the first title from RSA Press, the new publishing group from RSA Security. RSA Security helps organizations build secure, trusted foundations for e-business through its two-factor authentication, encryption and public key management systems.

Author Notes

Daniel J. Ryan is currently an Adjunct Professor of Information Security and Internet Law for George Washington University and James Madison University.

Table of Contents

William E. Baugh, Jr.Arthur W. Coviello, Jr.
Prefacep. ix
Acknowledgmentsp. xxi
List of Contributorsp. xxiii
Forewordp. xxxiii
Forewordp. xxxv
Part 1 Digital Espionage, Warfare, and Information Security (Infosec)p. 1
Chapter 1 Introduction to Digital Espionagep. 3
Chapter 2 Foundations of Information Security (Infosec)p. 41
Part 2 Infosec Conceptsp. 67
Chapter 3 Risk Management and Architecture of Information Security (Infosec)p. 69
Chapter 4 Information Security Policyp. 91
Chapter 5 Privacy in a Knowledge-Based Economyp. 119
Chapter 6 Security Verification of Systems and Networksp. 143
Part 3 Practical Countermeasuresp. 161
Chapter 7 Cryptographyp. 163
Chapter 8 Access Controls--Two Viewsp. 241
Chapter 9 Digital Signatures and Certification Authorities--Technology, Policy, and Legal Issuesp. 263
Chapter 10 Permissions Management: Identification, Authentication, and Authorization (PMIAA)p. 295
Chapter 11 Virtual Private Networksp. 331
Chapter 12 Biometric Countermeasuresp. 357
Part 4 Enterprise Continuity Planningp. 391
Chapter 13 Before the Attack: Protect and Detectp. 393
Chapter 14 During and After the Attack Special Consideration--The Web Serverp. 435
Part 5 Order of Battlep. 463
Chapter 15 The Big Picturep. 465
Chapter 16 Information Warfarep. 501
Chapter 17 Information Warfare Weapons, Intelligence, and the Cyberspace Environmentp. 549
Chapter 18 Methods of Employmentp. 579
Chapter 19 Public Key Infrastructure: Building Trust Onlinep. 603
Chapter 20 Cryptography Politics: Encryption Export Law and Its Impact on U.S. Industryp. 631
Appendix A The Information Technology Revolutionp. 661
Appendix B Definitions of Elecronic Signatures in Enacted State Legislationp. 677
Appendix C Enacted Legislation Authorizing the Use of Elecronic Signaturesp. 683
Appendix D Policy Initiatives--United Statesp. 687
Appendix E International--35 Countries and Political Entities Enact Digital Signature Legislationp. 691
Appendix F Bernstein and the Encryption Debatep. 701
Appendix G VPN Comparisonsp. 725
Appendix H Liability of Certificate Authorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislationp. 739
Glossaryp. 753
Referensesp. 817
Indexp. 843