This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access…mehr
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Rick Lehtinen started his career in electronic communications, from installing two-way radios to building television stations and satellite uplink facilities. Frequent contribution of articles to the trade press led to a position as an editor at Broadcast Engineering magazine, as well as a sister publication, Video Systems, which was followed by nationwide travel promoting desktop video production as "Dr. Video".After relocating to Phoenix, Lehtinen researched and produced marketing information for the semiconductor industry. This lead to a survey of computers and networking, which field eventually became a passion. Lehtinen financed his studies by teaching and writing, and is on the adjunct faculty of several community colleges and vocational schools. As a course writer for the Cisco Network Academy, he has worked with materials from conception through post-production, including learner assessment and the creation of annoying multiple choice questions. Lehtinen holds certifications in computer security (CISSP), networking (CCNP, CCDP), and telecommunications design (BICSII RCDD) and is the author of Computer Security Basics, 2/E. His hobbies include spending time with his family, playing the tuba, and writing about complimentary/alternative medical technologies. G.T. Gangemi, Sr., is Director of Wang Laboratories' Secure Systems Program. The Wang organization mirrors the structure of the U.S. government's Information Security (INFOSEC) program, encompassing computer security (COMPUSEC), communications security (COMSEC), TEMPEST, and physical access. Mr. Gangemi is responsible for all Wang security-related products designed for government and commercial use. He has previously held management positions at Wang in a variety of areas, including research and development, product management and marketing, account management, and business planning. He attended La Salle College and the Program for Senior Executives at Harvard University's Kennedy School of Government. He served in the U.S. Army and is a private pilot.
Inhaltsangabe
Preface Part I. Security for Today 1. Introduction The New Insecurity What Is Computer Security? Threats to Security Why Buy Security? What's a User to Do? 2. Some Security History Information and Its Controls Computer Security: Then and Now Early Computer Security Efforts Building Toward Standardization Computer Security Mandates and Legislation Part II. Computer Security 3. Computer System Security and Access Controls What Makes a System Secure? System Access: Logging into Your System 4. Viruses and Other Wildlife Financial Effects of Malicious Programs Viruses and Public Health Viruses, Worms, and Trojans (Oh, My!) Who Writes Viruses? Remedies The Virus Hype An Ounce of Prevention 5. Establishing and Maintaining a Security Policy Administrative Security Overall Planning and Administration Day-to-Day Administration Separation of Duties 6. Web Attacks and Internet Vulnerabilities About the Internet What Are the Network Protocols? The Fragile Web Part III. Communications Security 7. Encryption Some History What Is Encryption? The Data Encryption Standard Other Cryptographic Algorithms Message Authentication Government Cryptographic Programs Cryptographic Export Restrictions 8. Communications and Network Security What Makes Communication Secure? Modems Networks Network Security Part IV. Other Types of Security 9. Physical Security and Biometrics Physical Security Locks and Keys: Old and New Biometrics Gentle Reminder 10. Wireless Network Security How We Got Here Today's Wireless Infrastructure How Wireless Works Playing the Fields What Is This dB Stuff? Why Does All This Matter? Encouraging Diversity Physical Layer Wireless Attacks Part V. Appendixes A. OSI Model B. TEMPEST C. The Orange Book, FIPS PUBS, and the Common Criteria Index
Preface Part I. Security for Today 1. Introduction The New Insecurity What Is Computer Security? Threats to Security Why Buy Security? What's a User to Do? 2. Some Security History Information and Its Controls Computer Security: Then and Now Early Computer Security Efforts Building Toward Standardization Computer Security Mandates and Legislation Part II. Computer Security 3. Computer System Security and Access Controls What Makes a System Secure? System Access: Logging into Your System 4. Viruses and Other Wildlife Financial Effects of Malicious Programs Viruses and Public Health Viruses, Worms, and Trojans (Oh, My!) Who Writes Viruses? Remedies The Virus Hype An Ounce of Prevention 5. Establishing and Maintaining a Security Policy Administrative Security Overall Planning and Administration Day-to-Day Administration Separation of Duties 6. Web Attacks and Internet Vulnerabilities About the Internet What Are the Network Protocols? The Fragile Web Part III. Communications Security 7. Encryption Some History What Is Encryption? The Data Encryption Standard Other Cryptographic Algorithms Message Authentication Government Cryptographic Programs Cryptographic Export Restrictions 8. Communications and Network Security What Makes Communication Secure? Modems Networks Network Security Part IV. Other Types of Security 9. Physical Security and Biometrics Physical Security Locks and Keys: Old and New Biometrics Gentle Reminder 10. Wireless Network Security How We Got Here Today's Wireless Infrastructure How Wireless Works Playing the Fields What Is This dB Stuff? Why Does All This Matter? Encouraging Diversity Physical Layer Wireless Attacks Part V. Appendixes A. OSI Model B. TEMPEST C. The Orange Book, FIPS PUBS, and the Common Criteria Index
Rezensionen
"Decypher this! Diese US-amerikanische Einführung kommt mit wenigen Programmierbeispielen aus. In einfachen Worten und gut lesbar werden hier komplexe Konzepte rund um Zugangskontrollen, Kryptografie und Biometrie beschrieben. Ein Leckerbissen: der historische Ausflug zur legendären Kodierungsmaschine der Nazis, "Enigma", die schließlich kriegsentscheidend "geknackt" wurde - federführend übrigens nicht von den Engländern, sondern von drei Polen." -- Buchkatalog.de, Mai 2007 "Ohne sich in technischen Details zu verlieren, werden die jeweiligen Szenarien für den Leser verständlich dargestellt, konkrete Beispiele oder einzelne Illustrationen erleichtern das Verständnis komplexerer Themen. Am Ende eines Kapitels findet sich jeweils eine Zusammenfassung des vorangegangenen Inhalts. Wichtige Beispiele und Tipps sind übersichtlich im Text hervorgehoben und laden den Leser ein, das eine oder andere Gelernte in der Praxis zu erproben.
Fazit: In Computer Security Basics vermittelt Rick Lehtinen ein umfangreiches Grundwissen rund um den Themenbereich IT-Sicherheit. Die Neuauflage berücksichtigt dabei auch aktuelle Themen." -- Computer-Security.de, September 2006
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826