Computer Security Basics: Computer Security

Computer Security Basics: Computer Security

Computer Security Basics: Computer Security

Computer Security Basics: Computer Security

Paperback(Second Edition)

$44.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.



The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.



This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.



Topics include:
  • Computer security concepts
  • Security breaches, such as viruses and other malicious programs
  • Access controls
  • Security policy
  • Web attacks
  • Communications and network security
  • Encryption
  • Physical security and biometrics
  • Wireless network security
  • Computer security and requirements of the Orange Book
  • OSI Model and TEMPEST

Product Details

ISBN-13: 9780596006693
Publisher: O'Reilly Media, Incorporated
Publication date: 06/20/2006
Edition description: Second Edition
Pages: 310
Product dimensions: 7.00(w) x 9.19(h) x 0.74(d)

About the Author

Rick Lehtinen started his career in electronic communications, from installing two-way radios to building television stations and satellite uplink facilities. Frequent contribution of articles to the trade press led to a position as an editor at Broadcast Engineering magazine, as well as a sister publication, Video Systems, which was followed by nationwide travel promoting desktop video production as "Dr. Video".
After relocating to Phoenix, Lehtinen researched and produced marketing information for the semiconductor industry. This lead to a survey of computers and networking, which field eventually became a passion. Lehtinen financed his studies by teaching and writing, and is on the adjunct faculty of several community colleges and vocational schools. As a course writer for the Cisco Network Academy, he has worked with materials from conception through post-production, including learner assessment and the creation of annoying multiple choice questions. Lehtinen holds certifications in computer security (CISSP), networking (CCNP, CCDP), and telecommunications design (BICSII RCDD) and is the author of Computer Security Basics, 2/E. His hobbies include spending time with his family, playing the tuba, and writing about complimentary/alternative medical technologies.

G.T. Gangemi, Sr., is Director of Wang Laboratories' Secure Systems Program. The Wang organization mirrors the structure of the U.S. government's Information Security (INFOSEC) program, encompassing computer security (COMPUSEC), communications security (COMSEC), TEMPEST, and physical access. Mr. Gangemi is responsible for all Wang security-related products designed for government and commercial use. He has previously held management positions at Wang in a variety of areas, including research and development, product management and marketing, account management, and business planning. He attended La Salle College and the Program for Senior Executives at Harvard University's Kennedy School of Government. He served in the U.S. Army and is a private pilot.

Table of Contents

  • Preface
  • Security for Today
    • Chapter 1: Introduction
    • Chapter 2: Some Security History
  • Computer Security
    • Chapter 3: Computer System Security and Access Controls
    • Chapter 4: Viruses and Other Wildlife
    • Chapter 5: Establishing and Maintaining a Security Policy
    • Chapter 6: Web Attacks and Internet Vulnerabilities
  • Communications Security
    • Chapter 7: Encryption
    • Chapter 8: Communications and Network Security
  • Other Types of Security
    • Chapter 9: Physical Security and Biometrics
    • Chapter 10: Wireless Network Security
  • Appendixes
    • OSI Model
    • TEMPEST
    • The Orange Book, FIPS PUBS, and the Common Criteria
  • Colophon
From the B&N Reads Blog

Customer Reviews