21,95 €
21,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
11 °P sammeln
21,95 €
21,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
11 °P sammeln
Als Download kaufen
21,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
11 °P sammeln
Jetzt verschenken
21,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
11 °P sammeln
  • Format: ePub

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 2.96MB
Produktbeschreibung
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.Topics include:Computer security conceptsSecurity breaches, such as viruses and other malicious programsAccess controlsSecurity policyWeb attacksCommunications and network securityEncryptionPhysical security and biometricsWireless network securityComputer security and requirements of the Orange BookOSI Model and TEMPEST

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Rick Lehtinen started his career in electronic communications, from installing two-way radios to building television stations and satellite uplink facilities. Frequent contribution of articles to the trade press led to a position as an editor at Broadcast Engineering magazine, as well as a sister publication, Video Systems, which was followed by nationwide travel promoting desktop video production as "Dr. Video".After relocating to Phoenix, Lehtinen researched and produced marketing information for the semiconductor industry. This lead to a survey of computers and networking, which field eventually became a passion. Lehtinen financed his studies by teaching and writing, and is on the adjunct faculty of several community colleges and vocational schools. As a course writer for the Cisco Network Academy, he has worked with materials from conception through post-production, including learner assessment and the creation of annoying multiple choice questions. Lehtinen holds certifications in computer security (CISSP), networking (CCNP, CCDP), and telecommunications design (BICSII RCDD) and is the author of Computer Security Basics, 2/E. His hobbies include spending time with his family, playing the tuba, and writing about complimentary/alternative medical technologies. G.T. Gangemi, Sr., is Director of Wang Laboratories' Secure Systems Program. The Wang organization mirrors the structure of the U.S. government's Information Security (INFOSEC) program, encompassing computer security (COMPUSEC), communications security (COMSEC), TEMPEST, and physical access. Mr. Gangemi is responsible for all Wang security-related products designed for government and commercial use. He has previously held management positions at Wang in a variety of areas, including research and development, product management and marketing, account management, and business planning. He attended La Salle College and the Program for Senior Executives at Harvard University's Kennedy School of Government. He served in the U.S. Army and is a private pilot.
Rezensionen
"Decypher this! Diese US-amerikanische Einführung kommt mit wenigen Programmierbeispielen aus. In einfachen Worten und gut lesbar werden hier komplexe Konzepte rund um Zugangskontrollen, Kryptografie und Biometrie beschrieben. Ein Leckerbissen: der historische Ausflug zur legendären Kodierungsmaschine der Nazis, "Enigma", die schließlich kriegsentscheidend "geknackt" wurde - federführend übrigens nicht von den Engländern, sondern von drei Polen." -- Buchkatalog.de, Mai 2007 "Ohne sich in technischen Details zu verlieren, werden die jeweiligen Szenarien für den Leser verständlich dargestellt, konkrete Beispiele oder einzelne Illustrationen erleichtern das Verständnis komplexerer Themen. Am Ende eines Kapitels findet sich jeweils eine Zusammenfassung des vorangegangenen Inhalts. Wichtige Beispiele und Tipps sind übersichtlich im Text hervorgehoben und laden den Leser ein, das eine oder andere Gelernte in der Praxis zu erproben.

Fazit: In Computer Security Basics vermittelt Rick Lehtinen ein umfangreiches Grundwissen rund um den Themenbereich IT-Sicherheit. Die Neuauflage berücksichtigt dabei auch aktuelle Themen." -- Computer-Security.de, September 2006