Computer Security Basics, 2/e
Rick Lehtinen, G. T., Sr. Gangemi
- 出版商: O'Reilly Media
- 出版日期: 2006-06-23
- 售價: $1,563
- 貴賓價: 9.5 折 $1,485
- 語言: 英文
- 頁數: 312
- 裝訂: Paperback
- ISBN: 0596006691
- ISBN-13: 9780596006693
售價: $399Practical Unix & Internet Security, 3/e (Paperback)
貴賓價: $1,098Cryptography and Network Security: Principles and Practice, 5/e (IE-Paperback)
貴賓價: $1,884Security Power Tools
售價: $1,280Network Warrior, 2/e (Paperback)
貴賓價: $450深入理解機器學習：從原理到算法 (Understanding Machine Learning : From Theory to Algorithms)
貴賓價: $730惡意代碼分析實戰 (Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software)
貴賓價: $142單元測試的藝術 - 以 C# 為範例『第二版』
貴賓價: $336寫給程式師的資料採擷實踐指南 (A Programmer's Guide to Data Mining The Ancient Art of the Numerati)
貴賓價: $166實用機器學習(Real-world Machine Learning)
貴賓價: $450機器學習導論 (An Introduction to Machine Learning)
貴賓價: $393深入理解JVM ＆ G1 GC
貴賓價: $730深度學習、優化與識別 (Deep Learning,Optimization and Recognition)
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.
The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.
This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.Topics include:
- Computer security concepts
- Security breaches, such as viruses and other malicious programs
- Access controls
- Security policy
- Web attacks
- Communications and network security
- Physical security and biometrics
- Wireless network security
- Computer security and requirements of the Orange Book
- OSI Model and TEMPEST
Table of Contents
Part I. Security for Today
The New Insecurity
What Is Computer Security?
Threats to Security
Why Buy Security?
What's a User to Do?
2. Some Security History
Information and Its Controls
Computer Security: Then and Now
Early Computer Security Efforts
Building Toward Standardization
Computer Security Mandates and Legislation
Part II. Computer Security
3. Computer System Security and Access Controls
What Makes a System Secure?
System Access: Logging into Your System
4. Viruses and Other Wildlife
Financial Effects of Malicious Programs
Viruses and Public Health
Viruses, Worms, and Trojans (Oh, My!)
Who Writes Viruses?
The Virus Hype
An Ounce of Prevention
5. Establishing and Maintaining a Security Policy
Overall Planning and Administration
Separation of Duties
6. Web Attacks and Internet Vulnerabilities
About the Internet
What Are the Network Protocols?
The Fragile Web
Part III. Communications Security
What Is Encryption?
The Data Encryption Standard
Other Cryptographic Algorithms
Government Cryptographic Programs
Cryptographic Export Restrictions
8. Communications and Network Security
What Makes Communication Secure?
Part IV. Other Types of Security
9. Physical Security and Biometrics
Locks and Keys: Old and New
10. Wireless Network Security
How We Got Here
Today's Wireless Infrastructure
How Wireless Works
Playing the Fields
What Is This dB Stuff?
Why Does All This Matter?
Physical Layer Wireless Attacks
Part V. Appendixes
A. OSI Model
C. The Orange Book, FIPS PUBS, and the Common Criteria