Computer Security Basics

( 1 )

Overview

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, ...

See more details below
Paperback (Second Edition)
$34.30
BN.com price
(Save 23%)$44.99 List Price
Other sellers (Paperback)
  • All (16) from $9.99   
  • New (7) from $25.02   
  • Used (9) from $9.99   
Computer Security Basics

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.

Topics include:

  • Computer security concepts
  • Security breaches, such as viruses and other malicious programs
  • Access controls
  • Security policy
  • Web attacks
  • Communications and network security
  • Encryption
  • Physical security and biometrics
  • Wireless network security
  • Computer security and requirements of the Orange Book
  • OSI Model and TEMPEST

This new edition of a well-established handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells users what they need to know to understand the basics of computer security.

Read More Show Less

Product Details

  • ISBN-13: 9780596006693
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 6/20/2006
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 312
  • Sales rank: 878,424
  • Product dimensions: 7.04 (w) x 9.16 (h) x 0.74 (d)

Meet the Author

Rick Lehtinen started his career in electronic communications, from installing two-way radios to building television stations and satellite uplink facilities. Frequent contribution of articles to the trade press led to a position as an editor at Broadcast Engineering magazine, as well as a sister publication, Video Systems, which was followed by nationwide travel promoting desktop video production as "Dr. Video".After relocating to Phoenix, Lehtinen researched and produced marketing information for the semiconductor industry. This lead to a survey of computers and networking, which field eventually became a passion. Lehtinen financed his studies by teaching and writing, and is on the adjunct faculty of several community colleges and vocational schools. As a course writer for the Cisco Network Academy, he has worked with materials from conception through post-production, including learner assessment and the creation of annoying multiple choice questions. Lehtinen holds certifications in computer security (CISSP), networking (CCNP, CCDP), and telecommunications design (BICSII RCDD) and is the author of Computer Security Basics, 2/E. His hobbies include spending time with his family, playing the tuba, and writing about complimentary/alternative medical technologies.

G.T. Gangemi, Sr., is Director of Wang Laboratories' Secure Systems Program. The Wang organization mirrors the structure of the U.S. government's Information Security (INFOSEC) program, encompassing computer security (COMPUSEC), communications security (COMSEC), TEMPEST, and physical access. Mr. Gangemi is responsible for all Wang security-related products designed for government and commercial use. He has previously held management positions at Wang in a variety of areas, including research and development, product management and marketing, account management, and business planning. He attended La Salle College and the Program for Senior Executives at Harvard University's Kennedy School of Government. He served in the U.S. Army and is a private pilot.

Read More Show Less

Table of Contents

Preface;
About This Book;
Summary of Contents;
Using Code Examples;
Comments and Questions;
Safari® Enabled;
Acknowledgments;
Security for Today;
Chapter 1: Introduction;
1.1 The New Insecurity;
1.2 What Is Computer Security?;
1.3 Threats to Security;
1.4 Why Buy Security?;
1.5 What’s a User to Do?;
1.6 Summary;
Chapter 2: Some Security History;
2.1 Information and Its Controls;
2.2 Computer Security: Then and Now;
2.3 Early Computer Security Efforts;
2.4 Building Toward Standardization;
2.5 Computer Security Mandates and Legislation;
2.6 Summary;
Computer Security;
Chapter 3: Computer System Security and Access Controls;
3.1 What Makes a System Secure?;
3.2 System Access: Logging into Your System;
3.3 Summary;
Chapter 4: Viruses and Other Wildlife;
4.1 Financial Effects of Malicious Programs;
4.2 Viruses and Public Health;
4.3 Viruses, Worms, and Trojans (Oh, My!);
4.4 Who Writes Viruses?;
4.5 Remedies;
4.6 The Virus Hype;
4.7 An Ounce of Prevention;
4.8 Summary;
Chapter 5: Establishing and Maintaining a Security Policy;
5.1 Administrative Security;
5.2 Overall Planning and Administration;
5.3 Day-to-Day Administration;
5.4 Separation of Duties;
5.5 Summary;
Chapter 6: Web Attacks and Internet Vulnerabilities;
6.1 About the Internet;
6.2 What Are the Network Protocols?;
6.3 The Fragile Web;
6.4 Summary;
Communications Security;
Chapter 7: Encryption;
7.1 Some History;
7.2 What Is Encryption?;
7.3 The Data Encryption Standard;
7.4 Other Cryptographic Algorithms;
7.5 Message Authentication;
7.6 Government Cryptographic Programs;
7.7 Cryptographic Export Restrictions;
7.8 Summary;
Chapter 8: Communications and Network Security;
8.1 What Makes Communication Secure?;
8.2 Modems;
8.3 Networks;
8.4 Network Security;
8.5 Summary;
Other Types of Security;
Chapter 9: Physical Security and Biometrics;
9.1 Physical Security;
9.2 Locks and Keys: Old and New;
9.3 Biometrics;
9.4 Gentle Reminder;
9.5 Summary;
Chapter 10: Wireless Network Security;
10.1 How We Got Here;
10.2 Today’s Wireless Infrastructure;
10.3 How Wireless Works;
10.4 Playing the Fields;
10.5 What Is This dB Stuff?;
10.6 Why Does All This Matter?;
10.7 Encouraging Diversity;
10.8 Physical Layer Wireless Attacks;
10.9 Summary;
Appendixes;
OSI Model;
TEMPEST;
The Problem of Emanations;
The TEMPEST Program;
TEMPEST Standards;
Hard As You Try;
The Orange Book, FIPS PUBS, and the Common Criteria;
About the Orange Book;
Rating by the Book;
Summary of Orange Book Classes;
FIPS by the Numbers;
I Don’t Want You Smelling My Fish;
Colophon;

Read More Show Less

Customer Reviews

Average Rating 1
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted February 29, 2012

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)