Preventing Good People from doing Bad Things Implementing Least Privilege /

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Mutch, John (Συγγραφέας), Anderson, Brian (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2011.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02991nam a22004215i 4500
001 978-1-4302-3922-2
003 DE-He213
005 20151204175328.0
007 cr nn 008mamaa
008 111206s2011 xxu| s |||| 0|eng d
020 |a 9781430239222  |9 978-1-4302-3922-2 
024 7 |a 10.1007/978-1-4302-3922-2  |2 doi 
040 |d GrThAP 
050 4 |a HF4999.2-6182 
050 4 |a HD28-70 
072 7 |a KJ  |2 bicssc 
072 7 |a BUS042000  |2 bisacsh 
082 0 4 |a 650  |2 23 
100 1 |a Mutch, John.  |e author. 
245 1 0 |a Preventing Good People from doing Bad Things  |h [electronic resource] :  |b Implementing Least Privilege /  |c by John Mutch, Brian Anderson. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2011. 
300 |a XII, 220 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
520 |a In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into account the weakest link in their implementation: human nature. Despite all other efforts, people can sway from what they should be doing. Preventing Good People from doing Bad Things drives that concept home to business executives, auditors, and IT professionals alike. Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. The book also discusses the cost advantages of preventing good people from doing bad things. Each of the chapters emphasizes the need auditors, business executives, and IT professionals all have for least privilege, and discuss in detail the tensions and solutions it takes to implement this principle. Each chapter includes data from technology analysts including Forrester, Gartner, IDC, and Burton, along with analyst and industry expert quotations. 
650 0 |a Business. 
650 0 |a Management science. 
650 1 4 |a Business and Management. 
650 2 4 |a Business and Management, general. 
700 1 |a Anderson, Brian.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781430239215 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4302-3922-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SBE 
950 |a Business and Economics (Springer-11643)