買這商品的人也買了...
-
$1,584Practical Unix & Internet Security, 3/e (Paperback)
-
$820$804 -
$1,080Windows System Programming, 3/e (Hardcover)
-
$650$514 -
$780$663 -
$650$507 -
$650$429 -
$880$695 -
$690$538 -
$720$562 -
$720$569 -
$350$298 -
$1,560$1,326 -
$600$480 -
$580$493 -
$2,250$2,138 -
$490$382 -
$980$774 -
$420$357 -
$450$351 -
$490$387 -
$350$298 -
$950$741 -
$1,120$1,098 -
$2,275$2,161
相關主題
商品描述
Description
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.
The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.
This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Topics include:
- Computer security concepts
- Security breaches, such as viruses and other malicious programs
- Access controls
- Security policy
- Web attacks
- Communications and network security
- Encryption
- Physical security and biometrics
- Wireless network security
- Computer security and requirements of the Orange Book
- OSI Model and TEMPEST
Table of Contents
Preface
Part I. Security for Today
1. Introduction
The New Insecurity
What Is Computer Security?
Threats to Security
Why Buy Security?
What's a User to Do?
2. Some Security History
Information and Its Controls
Computer Security: Then and Now
Early Computer Security Efforts
Building Toward Standardization
Computer Security Mandates and Legislation
Part II. Computer Security
3. Computer System Security and Access Controls
What Makes a System Secure?
System Access: Logging into Your System
4. Viruses and Other Wildlife
Financial Effects of Malicious Programs
Viruses and Public Health
Viruses, Worms, and Trojans (Oh, My!)
Who Writes Viruses?
Remedies
The Virus Hype
An Ounce of Prevention
5. Establishing and Maintaining a Security Policy
Administrative Security
Overall Planning and Administration
Day-to-Day Administration
Separation of Duties
6. Web Attacks and Internet Vulnerabilities
About the Internet
What Are the Network Protocols?
The Fragile Web
Part III. Communications Security
7. Encryption
Some History
What Is Encryption?
The Data Encryption Standard
Other Cryptographic Algorithms
Message Authentication
Government Cryptographic Programs
Cryptographic Export Restrictions
8. Communications and Network Security
What Makes Communication Secure?
Modems
Networks
Network Security
Part IV. Other Types of Security
9. Physical Security and Biometrics
Physical Security
Locks and Keys: Old and New
Biometrics
Gentle Reminder
10. Wireless Network Security
How We Got Here
Today's Wireless Infrastructure
How Wireless Works
Playing the Fields
What Is This dB Stuff?
Why Does All This Matter?
Encouraging Diversity
Physical Layer Wireless Attacks
Part V. Appendixes
A. OSI Model
B. TEMPEST
C. The Orange Book, FIPS PUBS, and the Common Criteria
Index
商品描述(中文翻譯)
**描述**
這是一本必備的書籍,涵蓋了必須了解的領域。如今,基本的安全知識是必須的,如果您需要了解基礎知識,《Computer Security Basics》第二版是您應該參考的書籍。
新版本在原版中建立的成熟原則上進行了擴展,並徹底更新了核心知識。對於任何與計算機安全相關的人員,包括安全管理員、系統管理員、開發人員和IT經理,《Computer Security Basics》第二版提供了您需要了解的安全概念的清晰概述,包括存取控制、惡意軟體、安全政策、密碼學、生物識別技術,以及政府法規和標準。
本手冊以簡單的術語描述了複雜的概念,如受信系統、加密和強制存取控制。它告訴您了解計算機安全基礎所需的知識,並幫助您說服員工實踐安全計算。
主題包括:
- 計算機安全概念
- 安全漏洞,如病毒和其他惡意程式
- 存取控制
- 安全政策
- 網路攻擊
- 通信和網路安全
- 加密
- 實體安全和生物識別技術
- 無線網路安全
- 計算機安全與《橙皮書》的要求
- OSI模型和TEMPEST
**目錄**
前言
**第一部分:當今的安全**
1. 介紹
- 新的不安全性
- 什麼是計算機安全?
- 安全威脅
- 為什麼要購買安全?
- 使用者該怎麼辦?
2. 一些安全歷史
- 資訊及其控制
- 計算機安全:過去與現在
- 早期的計算機安全努力
- 朝向標準化的建設
- 計算機安全的法規和立法
**第二部分:計算機安全**
3. 計算機系統安全與存取控制
- 什麼使系統安全?
- 系統存取:登錄到您的系統
4. 病毒和其他野生程式
- 惡意程式的財務影響
- 病毒與公共健康
- 病毒、蠕蟲和木馬(哦,我的天!)
- 誰寫病毒?
- 補救措施
- 病毒的炒作
- 預防勝於治療
5. 建立和維護安全政策
- 行政安全
- 整體規劃與管理
- 日常管理
- 職責分離
6. 網路攻擊與互聯網漏洞
- 關於互聯網
- 網路協議是什麼?
- 脆弱的網路
**第三部分:通信安全**
7. 加密
- 一些歷史
- 什麼是加密?
- 數據加密標準
- 其他密碼學演算法
- 訊息驗證
- 政府的密碼學計劃
- 密碼學出口限制
8. 通信與網路安全
- 什麼使通信安全?
- 數據機
- 網路
- 網路安全
**第四部分:其他類型的安全**
9. 實體安全與生物識別技術
- 實體安全
- 鎖與鑰匙:舊與新
- 生物識別技術
- 溫馨提醒
10. 無線網路安全
- 我們是如何來到這裡的
- 當今的無線基礎設施
- 無線如何運作
- 競爭的領域
- 這些dB的東西是什麼?
- 這一切為什麼重要?
- 鼓勵多樣性
- 實體層無線攻擊
**第五部分:附錄**
A. OSI模型
B. TEMPEST
C. 《橙皮書》,FIPS PUBS,和通用標準
索引