Computer Security Basics, 2/e

Rick Lehtinen, G. T., Sr. Gangemi

  • 出版商: O'Reilly Media
  • 出版日期: 2006-06-23
  • 售價: $1,552
  • 貴賓價: 9.5$1,474
  • 語言: 英文
  • 頁數: 312
  • 裝訂: Paperback
  • ISBN: 0596006691
  • ISBN-13: 9780596006693

下單後立即進貨 (2~3週)

買這商品的人也買了...

商品描述

Description

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.

Topics include:
  • Computer security concepts
  • Security breaches, such as viruses and other malicious programs
  • Access controls
  • Security policy
  • Web attacks
  • Communications and network security
  • Encryption
  • Physical security and biometrics
  • Wireless network security
  • Computer security and requirements of the Orange Book
  • OSI Model and TEMPEST

 

Table of Contents

Preface

Part I. Security for Today

1. Introduction

     The New Insecurity

     What Is Computer Security?

     Threats to Security

     Why Buy Security?

     What's a User to Do?

2. Some Security History

     Information and Its Controls

     Computer Security: Then and Now

     Early Computer Security Efforts

     Building Toward Standardization

     Computer Security Mandates and Legislation

Part II. Computer Security

3. Computer System Security and Access Controls

     What Makes a System Secure?

     System Access: Logging into Your System

4. Viruses and Other Wildlife

     Financial Effects of Malicious Programs

     Viruses and Public Health

     Viruses, Worms, and Trojans (Oh, My!)

     Who Writes Viruses?

     Remedies

     The Virus Hype

     An Ounce of Prevention

5. Establishing and Maintaining a Security Policy

     Administrative Security

     Overall Planning and Administration

     Day-to-Day Administration

     Separation of Duties

6. Web Attacks and Internet Vulnerabilities

     About the Internet

     What Are the Network Protocols?

     The Fragile Web

Part III. Communications Security

7. Encryption

     Some History

     What Is Encryption?

     The Data Encryption Standard

     Other Cryptographic Algorithms

     Message Authentication

     Government Cryptographic Programs

     Cryptographic Export Restrictions

8. Communications and Network Security

     What Makes Communication Secure?

     Modems

     Networks

     Network Security

Part IV. Other Types of Security

9. Physical Security and Biometrics

     Physical Security

     Locks and Keys: Old and New

     Biometrics

     Gentle Reminder

10. Wireless Network Security

     How We Got Here

     Today's Wireless Infrastructure

     How Wireless Works

     Playing the Fields

     What Is This dB Stuff?

     Why Does All This Matter?

     Encouraging Diversity

     Physical Layer Wireless Attacks

Part V. Appendixes

A. OSI Model

B. TEMPEST

C. The Orange Book, FIPS PUBS, and the Common Criteria

Index