Computer Book Reviews - Computer Programming Book Reviews - IT eBooks Download

IT eBooks is a blog about Computer Book Reviews, Computer Programming Books Reviews, and IT eBooks Download. All books included Artificial Intelligence, Certification, Computer Application,Computer Engineering,Computer Hardware, Computer Security, Databases, Design Graphics,Networking,Operating System, Programming, Software Engineering, SQL Server 2005, ORACLE, Web 2.0, XML, ASP.NET 2.0, Flash 8, Dreamweaver 8, Ajax, Linux, Photoshop CS2, C#, C++, Java, CSS, Cisco, PHP, MySQL, Web Design

Thursday, July 27, 2006

Computer Security Basics

Books Details :

Author : Rick Lehtinen
Paperback: 310 pages
Publisher: O'Reilly Media; 2 edition (June 13, 2006)
Language: English
ISBN: 0596006691
Product Dimensions: 9.2 x 7.0 x 0.7 inches




Book Description

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.

Topics include:
  • Computer security concepts
  • Security breaches, such as viruses and other malicious programs
  • Access controls
  • Security policy
  • Web attacks
  • Communications and network security
  • Encryption
  • Physical security and biometrics
  • Wireless network security
  • Computer security and requirements of the Orange Book
  • OSI Model and TEMPEST
Spotlight Reviews :

Reviewer: calvinnme "Texan refugee" (Fredericksburg, Va)
This book is the long awaited second edition of a classic book in basic computer security. It is an introduction to the field, not a technical reference. If you need details on a particular aspect of computer security, you should refer to another more specialized book. Since Amazon does not show the table of contents, I review this book in reference to its table of contents:

Part I, SECURITY FOR TODAY
Chapter 1, Introduction
Introduces computer security: what it is and why it's important. It summarizes the threats to computers and the information stored on them, and it introduces the different types of computer security. It notes that if you ignore computer security you could not only be a crime victim but an unwitting partner in crime.
Chapter 2, Some Security History
Describes how we got to where we are today. It summarizes key events in the history of computer security, discusses some of the government standards and programs involved with computer security, and introduces the concept of computer databases and the preservation of privacy.

Part II, COMPUTER SECURITY
Chapter 3, Computer System Security and Access Controls
Introduces computer system security and describes how it controls access to systems and data.
Chapter 4, Viruses and Other Wildlife
Explores viruses, worms, Trojans, and other types of malicious code. The financial effects of malicious programs are discussed first, including that of wasted time. Next it equates viruses and public health - in that once your computer is infected others can be too using your computer as a jumping off point. The history of viruses is also discussed, including the fact that today's viruses and worms are basically malware written by malicious individuals, not computer scientists exploring the limits of technology as was once the case. Remedies, and more importantly, prevention is discussed.
Chapter 5, Establishing and Maintaining a Security Policy
Describes the administrative procedures that improve security within an organization and the three general categories of administrative security. It also introduces business continuity and disaster recovery as part of security. It also introduces the large numbers of laws now on the books relating to computer security, many that carry heavy fines in case of violation. It also mentions that it is important to implement separation of duties so no one person carries the load of security-related tasks.
Chapter 6, Web Attacks and Internet Vulnerabilities
This chapter deals with the basics of the Internet and the Web, as well as several important Internet protocols that keep the Internet humming from behind the scenes. The chapter then discusses vulnerabilities of several of these services, as well as exploits that can be used to attack them. Finally, this chapter gives several suggestions of how users can defend against those who misuse the Internet to steal or annoy.

Part III, COMMUNICATIONS SECURITY
Chapter 7, Encryption
This chapter explains what encryption is and how it protects data. The chapter discusses encryption definition and history. It also discusses DES (the Data Encryption Standard), as well as listing the acronyms of many other encryption algorithms. The chapter also defines message authentication, and lists several government cryptographic programs as well as mentioning cryptographic export restrictions.
Chapter 8, Communications and Network Security
Introduces network concepts and discusses some basic communications security issues. These issues include what makes communications secure, and the definition of modems, networks, and network security. Appropriate steps to keep your computer network safe from attack are outlined.

Part IV, OTHER TYPES OF SECURITY
Chapter 9, Physical Security and Biometrics
Introduces physical security and describes different types of biometric devices. Physical security is largely a system of common sense precautions and photo IDs, where biometrics is a new science where an individual's retina patterns, iris patterns, voice patterns, signatures, and keystroke patterns are measured and identified.
Chapter 10, Wireless Network Security
Describes the workings of wireless networks and the security ramifications of this access medium. Shows that although wireless computing is very convenient, it opens up a whole new world to hackers. Proper antenna selection to keep radio signals confined to the appropriate area is discussed. Careful attention to network cabling--all wireless networks end up connecting to a wired network at some point--also help assure security for the wireless environment.

In summary, this is a great little book for those just entering the field of computer security, as well as individual computer users who want to learn how to not be the weak link in either their professional or home network. It carefully defines terms and even has some good general advice on securing your computer and your network, but you should consult other books for details. I highly recommend it to the beginner who is interested in the field.

0 Comments:

Post a Comment

<< Home

 

   Add to Google       Add to My AOL    Subscribe in NewsGator Online    Subscribe in Bloglines    Add Computer Book Reviews , Computer Programming Book Reviews to Newsburst from CNET News.com       Subscribe in Rojo