No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:
Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.
Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.
This pamphlet sized book is a great training platform for keeping awareness up to par in your organization. Read morePublished on March 3 2004 by Brent Huston
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic. Read morePublished on Jan. 15 2004 by Anthony Lai Cheuk Tung
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic. Read morePublished on Jan. 12 2004 by Anthony LAI, CISSP
At 51 pages, this title is little more than a pamphlet compared with most IT security books. But here, brevity is a virtue, and I don't expect this slim volume to spend much time... Read morePublished on Dec 15 2003
How can you educate non-tech personnel on computer security? Buy them this book. It's brief and clear enough for even the most clueless end user to understand! Read morePublished on Oct. 13 2003 by Joy
This is a very straight to the point book for every end user.
The book is but 20 two-page chapters, but covers nearly everything a bout security about what every end user... Read more