Table of Contents

book cover
Computer Security Basics, 2nd Edition
By Rick Lehtinen
Publisher: O'Reilly
Pub Date: June 2006
Print ISBN-10: 0-596-00669-1
Print ISBN-13: 978-0-59-600669-3
Pages: 310

Table of Contents  | Index

    Part PART I:  Security for Today
        Chapter 1.  Introduction
      Section 1.1.  The New Insecurity
      Section 1.2.  What Is Computer Security?
      Section 1.3.  Threats to Security
      Section 1.4.  Why Buy Security?
      Section 1.5.  What's a User to Do?
      Section 1.6.  Summary
        Chapter 2.  Some Security History
      Section 2.1.  Information and Its Controls
      Section 2.2.  Computer Security: Then and Now
      Section 2.3.  Early Computer Security Efforts
      Section 2.4.  Building Toward Standardization
      Section 2.5.  Computer Security Mandates and Legislation
      Section 2.6.  Summary
    Part PART II:  Computer Security
        Chapter 3.  Computer System Security and Access Controls
      Section 3.1.  What Makes a System Secure?
      Section 3.2.  System Access: Logging into Your System
      Section 3.3.  Summary
        Chapter 4.  Viruses and Other Wildlife
      Section 4.1.  Financial Effects of Malicious Programs
      Section 4.2.  Viruses and Public Health
      Section 4.3.  Viruses, Worms, and Trojans (Oh, My!)
      Section 4.4.  Who Writes Viruses?
      Section 4.5.  Remedies
      Section 4.6.  The Virus Hype
      Section 4.7.  An Ounce of Prevention
      Section 4.8.  Summary
        Chapter 5.  Establishing and Maintaining a Security Policy
      Section 5.1.  Administrative Security
      Section 5.2.  Overall Planning and Administration
      Section 5.3.  Day-to-Day Administration
      Section 5.4.  Separation of Duties
      Section 5.5.  Summary
        Chapter 6.  Web Attacks and Internet Vulnerabilities
      Section 6.1.  About the Internet
      Section 6.2.  What Are the Network Protocols?
      Section 6.3.  The Fragile Web
      Section 6.4.  Summary
    Part PART III:  Communications Security
        Chapter 7.  Encryption
      Section 7.1.  Some History
      Section 7.2.  What Is Encryption?
      Section 7.3.  The Data Encryption Standard
      Section 7.4.  Other Cryptographic Algorithms
      Section 7.5.  Message Authentication
      Section 7.6.  Government Cryptographic Programs
      Section 7.7.  Cryptographic Export Restrictions
      Section 7.8.  Summary
        Chapter 8.  Communications and Network Security
      Section 8.1.  What Makes Communication Secure?
      Section 8.2.  Modems
      Section 8.3.  Networks
      Section 8.4.  Network Security
      Section 8.5.  Summary
    Part PART IV:  Other Types of Security
        Chapter 9.  Physical Security and Biometrics
      Section 9.1.  Physical Security
      Section 9.2.  Locks and Keys: Old and New
      Section 9.3.  Biometrics
      Section 9.4.  Gentle Reminder
      Section 9.5.  Summary
        Chapter 10.  Wireless Network Security
      Section 10.1.  How We Got Here
      Section 10.2.  Today's Wireless Infrastructure
      Section 10.3.  How Wireless Works
      Section 10.4.  Playing the Fields
      Section 10.5.  What Is This dB Stuff?
      Section 10.6.  Why Does All This Matter?
      Section 10.7.  Encouraging Diversity
      Section 10.8.  Physical Layer Wireless Attacks
      Section 10.9.  Summary
    Part PART V:  Appendixes
        OSI Model
      Section B.1.  The Problem of Emanations
      Section B.2.  The TEMPEST Program
      Section B.3.  TEMPEST Standards
      Section B.4.  Hard As You Try
        The Orange Book, FIPS PUBS, and the Common Criteria
      Section C.1.  About the Orange Book
      Section C.2.  Rating by the Book
      Section C.3.  Summary of Orange Book Classes
      Section C.4.  FIPS by the Numbers
      Section C.5.  I Don't Want You Smelling My Fish
   About the Author

Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: