000 02926nam a22003975i 4500
001 u371033
003 SIRSI
005 20160812080106.0
007 cr nn 008mamaa
008 111206s2011 xxu| s |||| 0|eng d
020 _a9781430239222
_9978-1-4302-3922-2
040 _cMX-MeUAM
050 4 _aHF4999.2-6182
050 4 _aHD28-70
082 0 4 _a650
_223
100 1 _aMutch, John.
_eauthor.
245 1 0 _aPreventing Good People from doing Bad Things
_h[recurso electrónico] :
_bImplementing Least Privilege /
_cby John Mutch, Brian Anderson.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2011.
300 _aXII, 192 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
520 _aIn today's turbulent technological environment, it's becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into account the weakest link in their implementation: human nature. Despite all other efforts, people can sway from what they should be doing. Preventing Good People from doing Bad Things drives that concept home to business executives, auditors, and IT professionals alike. Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft's Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. The book also discusses the cost advantages of preventing good people from doing bad things. Each of the chapters emphasizes the need auditors, business executives, and IT professionals all have for least privilege, and discuss in detail the tensions and solutions it takes to implement this principle. Each chapter includes data from technology analysts including Forrester, Gartner, IDC, and Burton, along with analyst and industry expert quotations.
650 0 _aEconomics.
650 1 4 _aEconomics/Management Science.
650 2 4 _aBusiness/Management Science, general.
700 1 _aAnderson, Brian.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781430239215
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4302-3922-2
596 _a19
942 _cLIBRO_ELEC
999 _c198913
_d198913