O’Reilly writes- It doesn’t matter if you’re looking after a highly secure banking network or if you’re an ordinary user concerned with malware and identity theft–security concerns and affects us all.
According to Rick Lehtinen, author of the new edition of “Computer Security Basics” (Lehtinen, Russell, and Gangemi, O’Reilly, US $39.99), computer security has taken on some new meanings in the wake of the terrorist attacks of September 11, 2001.
The first of these changes is
positive, he says. “As part of a global tightening of belts and rolling up
of sleeves, there emerged several outreaches designed to provide security
training and certification to folks in all walks of life, from the
consumer being alerted about identity theft, to the soldier and sailor and
weapons scientist taking greater precautions with items of national
security, to the common person on the street gaining a heightened
awareness of hackers and crackers and cyber attackers.” Lehtinen explains
that gradually this new emphasis on computer and network safety has
percolated down to the ordinary user’s computer in the den or living room.
“And because it really is a small Internet,” he says, “what affects one
usually affects all. The safer individual users are, the safer the Net is
To gain a clear understanding of the basics of securing a computer or
network, look no further than “Computer Security Basics, Second Edition.”
The first edition of this book was so popular–and practical–that it
remained in print since 1991. This new edition builds on the
well-established principles developed in the original and updates that
core knowledge thoroughly.
The book describes complicated concepts–such as trusted systems,
encryption, and mandatory access control–in simple terms. Ideal for
anyone who is involved with computer security, including security
administrators, system administrators, developers, and IT managers, it
covers the following topics and more:
-Security breaches, such as viruses and other malicious programs
-Wireless network security
-Computer security and requirements of the Orange Book
-OSI Model and TEMPEST
Latest posts by Ramon Ray (see all)
- How A Beauty Company Keeps Its Tech Edge – CTO Interview. Outsource and Get Expert Help. - September 18, 2018
- 7 Steps to Creating Your Own Startup - September 13, 2018
- Apple’s New Product Lines. What’s In It for Small Business? - September 12, 2018