Computer Security Basics(English, Paperback, Lehtinen Rick) | Zipri.in
Computer Security Basics(English, Paperback, Lehtinen Rick)

Computer Security Basics(English, Paperback, Lehtinen Rick)

Quick Overview

Rs.1100 on FlipkartBuy
Product Price Comparison
This is the must-have book for a must-know field. Today, general security knowledge is man datory, and if you need to understand the fundamentals, Computer Security Basics is the book for you. This new edition builds on the well-established principles developed in the original edition and updates that core knowledge thoroughly. For anyone who is involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics offers a clear overview of the security concepts you need to know. Topics range from access controls, malicious software, security policy, cryptography, and biometrics, to government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST About the Author Rick Lehtinen started his career in electronic communications, from installing two-way radios to building television stations and satellite uplink facilities. Frequent contribution of articles to the trade press led to a position as an editor at Broadcast Engineering magazine, as well as a sister publication, Video Systems, which was followed by nationwide travel promoting desktop video production as "Dr. Video". After relocating to Phoenix, Lehtinen researched and produced marketing information for the semiconductor industry. This lead to a survey of computers and networking, which field eventually became a passion. Lehtinen financed his studies by teaching and writing, and is on the adjunct faculty of several community colleges and vocational schools. As a course writer for the Cisco Network Academy, he has worked with materials from conception through post-production, including learner assessment and the creation of annoying multiple choice questions. Lehtinen holds certifications in computer security (CISSP), networking (CCNP, CCDP), and telecommunications design (BICSII RCDD) and is the author of Computer Security Basics, 2/E. His hobbies include spending time with his family, playing the tuba, and writing about complimentary/alternative medical technologies. G.T. Gangemi, Sr. is Director of Wang Laboratories' Secure Systems Program. The Wang organization mirrors the structure of the U.S. government's Information Security (INFOSEC) program, encompassing computer security (COMPUSEC), communications security (COMSEC), TEMPEST, and physical access. Mr. Gangemi is responsible for all Wang security-related products designed for government and commercial use. He has previously held management positions at Wang in a variety of areas, including research and development, product management and marketing, account management, and business planning. He attended La Salle College and the Program for Senior Executives at Harvard University's Kennedy School of Government. He served in the U.S. Army and is a private pilot. Table of Contents Security for Today Chapter 1 Introduction Chapter 2 Some Security History Computer Security Chapter 3 Computer System Security and Access Controls Chapter 4 Viruses and Other Wildlife Chapter 5 Establishing and Maintaining a Security Policy Chapter 6 Web Attacks and Internet Vulnerabilities Communications Security Chapter 7 Encryption Chapter 8 Communications and Network Security Other Types of Security Chapter 9 Physical Security and Biometrics Chapter 10 Wireless Network Security Appendixes Appendix OSI Model Appendix TEMPEST Appendix The Orange Book, FIPS PUBS, and the Common Criteria Colophon