• Complain

Lehtinen Rick Gangemi G. T. Sr. - Computer Security Basics

Here you can read online Lehtinen Rick Gangemi G. T. Sr. - Computer Security Basics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Sebastopol, year: 2011, publisher: OReilly Media, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Computer Security Basics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Computer Security Basics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including acces. Read more...
Abstract: This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including acces

Lehtinen Rick Gangemi G. T. Sr.: author's other books


Who wrote Computer Security Basics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Computer Security Basics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Computer Security Basics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Computer Security Basics, 2nd Edition
Rick Lehtinen
G.T. Gangemi Sr.
Editor
Tatiana Apandi

Copyright 2011 O'Reilly Media, Inc.

SPECIAL OFFER Upgrade this ebook with OReilly for more information on this - photo 1


SPECIAL OFFER: Upgrade this ebook with OReilly

for more information on this offer!

Please note that upgrade offers are not available from sample content.

Preface
About This Book

This book is about computer securitywhat it is, where it came from, where its going, and why we should care about it. It introduces the many different areas of security in clear and simple terms: access controls, worms and viruses, cryptography, firewalls, network and web security, biometric devices, and more. If youre at all interested in computer security or if computer security is a part of your job (whether you want it to be or not!), you should find this book useful. Ive tried to give you the big picture and quite a few helpful details.

This book is not a technical reference. Ive tried to pull together the basics about many different areas of computer security and put that information together comprehensively. If you need particularly technical information about a specific area of computer security (for example, making your specific system or operating system more secure, securing your web site, or configuring a router or firewall), you should refer to other, more specialized books.

Summary of Contents

This book is divided into 10 chapters and 3 appendixes.

, Security for Today

This section presents a brief overview of what computer security is, where it came from, and where its going.

, Introduction

This chapter introduces computer security: what it is and why its important. It summarizes the threats to computers and the information stored on them, and it introduces the different types of computer security.

, Some Security History

This chapter briefly describes the history of computer security: where it came from, and what government mandates, laws, and standards address it.

, Computer Security

This section discusses computer security methods of protecting information stored in a computer system, primarily by controlling access to that information.

, Computer System Security and Access Controls

This chapter introduces computer system security and describes how that security controls access to systems and data.

, Viruses and Other Wildlife

This chapter explores viruses, worms, Trojans, and other types of malicious code.

, Establishing and Maintaining a Security Policy

This chapter describes the administrative procedures that improve security within an organization. It also introduces business continuity and disaster recovery as part of security.

, Web Attacks and Internet Vulnerabilities

This chapter introduces the perils that can attack your system or network while it is connected to the Internet.

, Communications Security

This section discusses communications security methods of protecting information while its being transmitted over communications lines and network backbones.

, Encryption

This chapter explains what encryption is and how it protects data.

, Communications and Network Security

This chapter introduces network concepts and discusses some basic communications security issues.

, Other Types of Security

This section describes several additional types of security.

, Physical Security and Biometrics

This chapter introduces physical security and describes different types of biometric devices.

, Wireless Network Security

This chapter describes the workings of wireless networks and the security ramifications of this access medium.

, Appendixes

This section provides a number of quick references to computer security requirements and programs.

, OSI Model

This appendix describes the seven layers of OSI and how each relates to security.

, TEMPEST

This appendix describes what TEMPEST is and why its important.

, The Orange Book, FIPS PUBS, and the Common Criteria

This appendix provides a summary of legacy Orange Book requirements, the Federal Information Processing Publications (FIPS PUBS), and the Common Criteria, which is the international successor to the Orange Book.

Using Code Examples

This book is here to help you get your job done. In general, you may use the code in this book in your programs and documentation. You do not need to contact OReilly for permission unless youre reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing a CD-ROM of examples from OReilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your products documentation does require permission.

We appreciate, but do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: Computer Security Basics , Second Edition, by Rick Lehtinen, Deborah Russell, and G.T. Gangemi Sr. Copyright 2006 OReilly Media, Inc., 0-596-00669-1.

Comments and Questions

Please address comments and questions concerning this book to the publisher:

OReilly Media, Inc.

1005 Gravenstein Highway North

Sebastopol, CA 95472

800-998-9938 (in the United States or Canada)

707-829-0515 (international or local)

707-829-0104 (fax)

We have a web page for this book that lists errata, examples, and any additional information. You can access this page at:

http://www.oreilly.com/catalog/csb2

To comment or ask technical questions about this book, send email to:

For more information about our books, conferences, Resource Centers, and the OReilly Network, see our web site at:

http://www.oreilly.com

Safari Enabled

When you see a Safari Enabled icon on the cover of your favorite technology book, that means the book is available online through the OReilly Network Safari Bookshelf.

Safari offers a solution thats better than e-books. Its a virtual library that lets you easily search thousands of top tech books, cut and paste code samples, download chapters, and find quick answers when you need the most accurate, current information. Try it for free at http://safari.oreilly.com.

Acknowledgments

Any author of a second edition is incredibly indebted to the authors of the first. Deborah Russell, you were great to work with from start to finish. The text authored by you and G.T. Gangemi Sr. gave me an excellent starting point. Lets do it again some day. And to my buds at Ciscos Network Academy and to Gwen, my CISSP coach, who put me up to thiswarm thanks, I owe you.

Thanks to Kathy, Jana, Jon, Kyle and a few cats who did not see enough of me during this books production, and Louise who said I shouldnt undertake it, but was kind of proud once it got done.

Many people from OReilly helped to produce this second edition: Deborah Russell for seeing the value in the project and Tatiana Apandi for keeping me at it and cheering me on when it conflicted with my day job. Thanks to my technical reviewers: Mark Lucking, Simon Biles, and especially Mary Dageforde for all her help. Many thanks!

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Computer Security Basics»

Look at similar books to Computer Security Basics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Computer Security Basics»

Discussion, reviews of the book Computer Security Basics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.