Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Basics

Buy
Computer Security Basics, 9780596006693 (0596006691), O'Reilly, 2006

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.Topics include:
  • Computer security concepts

  • Security breaches, such as viruses and other malicious programs

  • Access controls

  • Security policy

  • Web attacks

  • Communications and network security

  • Encryption

  • Physical security and biometrics

  • Wireless network security

  • Computer security and requirements of the Orange Book

  • OSI Model and TEMPEST

(HTML tags aren't allowed.)

Solar System Moons: Discovery and Mythology
Solar System Moons: Discovery and Mythology

Starting from Mars outward this concise handbook provides thorough information on the satellites of the planets in the solar system. Each chapter begins with a section on the discovery and the naming of the planet’s satellites or rings. This is followed by a section presenting the historic sources of those names. The book contains tables...

Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States

Relations between the European Union and China have grown at a sustained pace across the board in recent times, transforming the relationship from one of previous neglect into a matter of global strategic significance. This book offers an examination of the evolution of contemporary EU-China relations in the economic, technological and high...

Professional Microsoft PowerPivot for Excel and SharePoint
Professional Microsoft PowerPivot for Excel and SharePoint

With PowerPivot, Microsoft brings the power of Microsoft's business intelligence tools to Excel and SharePoint users. Self-service business intelligence today augments traditional BI methods, allowing faster response time and greater flexibility. If you're a business decision-maker who uses Microsoft Office or an IT professional...


Essential Skills for Agile Development
Essential Skills for Agile Development
Agile Development, in particular, eXtreme Programming (XP), has been gaining a lot of momentum because it can effectively address the problems plaguing software development such as mis-understanding customers' requirements, missing deadlines, over-budget, conflicts between customers and developers and poor maintainability of legacy systems....
Photography: The Art of Composition
Photography: The Art of Composition
Photographers can now perfect their ability to perceive and record scenes with this fresh approach to composition. Unlike other composition resources, which are based on graphic design principles, Photography: The Art of Composition uses cognitive science to help photographers develop greater artistic proficiency. Illustrated by more than 250...
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003
SAC 2003 was the tenth in a series of annual workshops on Selected Areas in Cryptography. This marked the third time that the workshop had been held at Carleton University in Ottawa with previous workshops being held there in 1995 and 1997. The intent of the SAC workshops is to provide a relaxed atmosphere in which researchers in cryptography can...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy