Flylib.com
Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121
Authors:
Rick Lehtinen
,
G.T. Gangemi Sr.
BUY ON AMAZON
Computer Security Basics, 2nd Edition
Table of Contents
Copyright
Preface
Part PART I: Security for Today
Chapter 1. Introduction
Section 1.1. The New Insecurity
Section 1.2. What Is Computer Security?
Section 1.3. Threats to Security
Section 1.4. Why Buy Security?
Section 1.5. What s a User to Do?
Section 1.6. Summary
Chapter 2. Some Security History
Section 2.1. Information and Its Controls
Section 2.2. Computer Security: Then and Now
Section 2.3. Early Computer Security Efforts
Section 2.4. Building Toward Standardization
Section 2.5. Computer Security Mandates and Legislation
Section 2.6. Summary
Part PART II: Computer Security
Chapter 3. Computer System Security and Access Controls
Section 3.1. What Makes a System Secure?
Section 3.2. System Access: Logging into Your System
Section 3.3. Summary
Chapter 4. Viruses and Other Wildlife
Section 4.1. Financial Effects of Malicious Programs
Section 4.2. Viruses and Public Health
Section 4.3. Viruses, Worms, and Trojans (Oh, My)
Section 4.4. Who Writes Viruses?
Section 4.5. Remedies
Section 4.6. The Virus Hype
Section 4.7. An Ounce of Prevention
Section 4.8. Summary
Chapter 5. Establishing and Maintaining a Security Policy
Section 5.1. Administrative Security
Section 5.2. Overall Planning and Administration
Section 5.3. Day-to-Day Administration
Section 5.4. Separation of Duties
Section 5.5. Summary
Chapter 6. Web Attacks and Internet Vulnerabilities
Section 6.1. About the Internet
Section 6.2. What Are the Network Protocols?
Section 6.3. The Fragile Web
Section 6.4. Summary
Part PART III: Communications Security
Chapter 7. Encryption
Section 7.1. Some History
Section 7.2. What Is Encryption?
Section 7.3. The Data Encryption Standard
Section 7.4. Other Cryptographic Algorithms
Section 7.5. Message Authentication
Section 7.6. Government Cryptographic Programs
Section 7.7. Cryptographic Export Restrictions
Section 7.8. Summary
Chapter 8. Communications and Network Security
Section 8.1. What Makes Communication Secure?
Section 8.2. Modems
Section 8.3. Networks
Section 8.4. Network Security
Section 8.5. Summary
Part PART IV: Other Types of Security
Chapter 9. Physical Security and Biometrics
Section 9.1. Physical Security
Section 9.2. Locks and Keys: Old and New
Section 9.3. Biometrics
Section 9.4. Gentle Reminder
Section 9.5. Summary
Chapter 10. Wireless Network Security
Section 10.1. How We Got Here
Section 10.2. Today s Wireless Infrastructure
Section 10.3. How Wireless Works
Section 10.4. Playing the Fields
Section 10.5. What Is This dB Stuff?
Section 10.6. Why Does All This Matter?
Section 10.7. Encouraging Diversity
Section 10.8. Physical Layer Wireless Attacks
Section 10.9. Summary
Part PART V: Appendixes
OSI Model
TEMPEST
Section B.1. The Problem of Emanations
Section B.2. The TEMPEST Program
Section B.3. TEMPEST Standards
Section B.4. Hard As You Try
The Orange Book, FIPS PUBS, and the Common Criteria
Section C.1. About the Orange Book
Section C.2. Rating by the Book
Section C.3. Summary of Orange Book Classes
Section C.4. FIPS by the Numbers
Section C.5. I Don t Want You Smelling My Fish
About the Author
Colophon
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121
Authors:
Rick Lehtinen
,
G.T. Gangemi Sr.
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Reducing #includes with Forward Class Declarations
Converting a String to a Numeric Type
Transforming Elements in a Sequence
Making a Class Readable from a Stream
Representing Large Fixed-Width Integers
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Cisco Secure IDS
Laws, Standards, and Organizations
Security Business Issues
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
Logistics in Tesco: Past, Present and Future
Temperature-Controlled Supply Chains
Rethinking Efficient Replenishment in the Grocery Sector
InDesign Type: Professional Typography with Adobe InDesign CS2
Swash Characters
Balancing Ragged Lines
Paragraph Indents and Spacing
Right Indent Tab
Mo Style
FileMaker 8 Functions and Scripts Desk Reference
Get(LastODBCError)
Katakana()
Month()
RightWords()
Command Line Reference
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies