Paperback: 312 pages
Publisher: O'Reilly Media; 2 edition (June 23, 2006)
Product Dimensions: 7 x 0.7 x 9.2 inches
Shipping Weight: 1.1 pounds (View shipping rates and policies)
Average Customer Review: 3.9 out of 5 stars See all reviews (19 customer reviews)
Best Sellers Rank: #132,101 in Books (See Top 100 in Books) #11 in Books > Computers & Technology > Software > Utilities #12 in Books > Computers & Technology > Networking & Cloud Computing > Network Administration > Disaster & Recovery #31 in Books > Computers & Technology > Certification > CompTIA
This book is the long awaited second edition of a classic book in basic computer security. It is an introduction to the field, not a technical reference. If you need details on a particular aspect of computer security, you should refer to another more specialized book. Since does not show the table of contents, I review this book in reference to its table of contents:Part I, SECURITY FOR TODAYChapter 1, IntroductionIntroduces computer security: what it is and why it's important. It summarizes the threats to computers and the information stored on them, and it introduces the different types of computer security. It notes that if you ignore computer security you could not only be a crime victim but an unwitting partner in crime.Chapter 2, Some Security HistoryDescribes how we got to where we are today. It summarizes key events in the history of computer security, discusses some of the government standards and programs involved with computer security, and introduces the concept of computer databases and the preservation of privacy.Part II, COMPUTER SECURITYChapter 3, Computer System Security and Access ControlsIntroduces computer system security and describes how it controls access to systems and data.Chapter 4, Viruses and Other WildlifeExplores viruses, worms, Trojans, and other types of malicious code. The financial effects of malicious programs are discussed first, including that of wasted time. Next it equates viruses and public health - in that once your computer is infected others can be too using your computer as a jumping off point.
It still surprises me how many of my information technology colleagues still have no clue when it comes to computer security. This particular book is one I'd feel really good about when it comes to a recommendation to get them up to speed on the subject... Computer Security Basics (2nd Edition) by Rick Lehtinen, Deborah Russell, and G. T. Gangemi Sr.Contents:Part 1 - Security for Today: Introduction; Some Security HistoryPart 2 - Computer Security: Computer System Security and Access Controls; Viruses and Other Wildlife; Establishing and Maintaining a Security Policy; Web Attacks and Internet VulnerabilitiesPart 3 - Communications Security: Encryption; Communications and Network SecurityPart 4 - Other Types of Security: Physical Security and Biometrics; Wireless Network SecurityPart 5 - Appendixes: OSI Model; TEMPEST; The Orange Book, FIPS PUBS, and the Common CriteriaIndexWhile not a technical "how to" manual, this book does a great job in dealing with technical issues and concepts. Pretty much all the significant issues surrounding computer and technology security these days is covered in sufficient detail to allow for a functional understanding of the topics. For instance, the chapter on viruses would allow even the most clueless techie to grasp the problems. The authors distinguish between viruses, worms, trojan horses, bombs, and other various nasty surprises. The history is valuable to understand how we got into this condition, and by the end of the chapter you'll know what you need to do to start to combat the problem. From there, you can dive into the more technical details of any one of the areas that pertain to your particular situation.
Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Home Security Basics: The easiest and most affordable ways to improve your home security. Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Practical UNIX and Internet Security (Computer Security) Network Security: Private Communications in a Public World (Radia Perlman Series in Computer Networking and Security) Principles of Computer Security: CompTIA Security+ and Beyond [With CDROM] (Official Comptia Guide) Security, Rights, & Liabilities in E-Commerce (Artech House Computer Security Series) Computer Security Basics Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing (Computer Science Series) Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! SQL Handbook: Learning The Basics Of SQL Programming (Computer Science Programming) (Computer Programming For Beginners) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) CompTIA Security+ Guide to Network Security Fundamentals