商家名称 | 信用等级 | 购买信息 | 订购本书 |
IT Ethics Handbook: Right and Wrong for IT Professionals | |||
IT Ethics Handbook: Right and Wrong for IT Professionals |
Hundreds of Scenarios for You to Consider, Including:
Independent Audit Failures - Do You Report or Keep Things Quiet?
Handling Bounced E-mails - To Look or Not
Cracking Screen Saver Passwords - Should You or Shouldnt You?
Bad Code - Whose Problem is It?
Failing to Perform Required Data Backup - What if You Miss One?
Music Downloading and ISPs - Should They Share the Information?
Questionable Internet Viewing - What do You do About Offensive Material?
Marketing Roles - What if You Have Insider Knowledge about Your Competition?
End-user License Agreements - What is the Companys True Responsibility?
Code Re-use for a Different Customer - Should You Charge for It?
Personal Privacy for Telecommuters - How Much Should You Have?
Vulnerability Scanners - In Place of Penetration Testing?
Privacy Complaints - Whats if its a Matter of National Security?
Your Solutions Membership Gives You Access to:
Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page
"From the Author" Forum where the authors post timely updates and links to related sites
These Downloadable e-booklets:
Security Assessment: System Information Criticality
Stealing The Network: How to Own a Continent: Product of Fate: The Evolution of a Hacker
Richard Thieme's Islands in the Clickstream: Reflections on Life in a Virtual World: Hacking and the Passion for Knowledge
WarDriving, Drive, Detect, Defend: Learning to WarDrive
作者简介 Stephen Northcutt, Director of Training and Certification for the SANS Institute, is a graduate of Mary Washington College. Before entering the computer security field he had a varied career as a Navy helicopter search and rescue crewman, white water rafting guide, culinary chef, martial arts instructor, cartographer, and network designer. He is the author or co-author of various publications including: Incident Handling Step-by-Step, Intrusion Signatures and Analysis, Inside Network Perimeter Security, SANS Security Essentials, Network Intrusion Detection, 3RD edition and now IT Ethics Handbook: Right and Wrong for IT Professionals. He was also the original author of the Shadow Intrusion Detection system and first DoD Shadow team leader before becoming the Chief for Information Warfare at the Ballistic Missile Defense Organization.
Cynthia Madden was educated at the University of Connecticut and Columbia University. She has ten years of experience working as a senior consultant on Wall Street advising brokerage firms on all aspects of information technology and business ranging from hands on software development to high-level management and street-wide test co-ordination. Her passion is bringing a new model to businesses, which creates co-operation, balance, and integrity among all relationships within a business be it management and employees, vendors relationships, investor relations, and family life for employees and business owners alike. Cynthia lives in Hawaii and is an active martial artist holding two championship titles for womens black belt division full contact fighting.