| Overview
This is the must-have book for a must-know field. Today, general
security knowledge is mandatory, and, if you who need to understand
the fundamentals, Computer Security Basics 2nd Edition is
the book to consult.
The new edition builds on the well-established principles
developed in the original edition and thoroughly updates that core
knowledge. For anyone involved with computer security, including
security administrators, system administrators, developers, and IT
managers, Computer Security Basics 2nd Edition offers a
clear overview of the security concepts you need to know, including
access controls, malicious software, security policy, cryptography,
biometrics, as well as government regulations and standards.
This handbook describes complicated concepts such as trusted
systems, encryption, and mandatory access control in simple terms.
It tells you what you need to know to understand the basics of
computer security, and it will help you persuade your employees to
practice safe computing.
Computer security concepts Security breaches, such as viruses and other malicious
programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST
Topics include:
Editorial ReviewsBook Description | In 1991, computer security was a vague subject that managers and system administrators decided, reluctantly, that they needed to know more about. Most security initiatives were based on the "Orange Book" (Trusted Computer System Evaluation Criteria), a US Department of Defense publication that baffled casual readers. O'Reilly's "Computer Security Basics" contained a readable introduction to the Orange Book -- why it existed, what it contained, and what the different security levels were all about. Over the past 15 years, this classic book has continued to sell steadily. Today, security is a hot topic, and international (ISO) security standards largely have replaced the Orange Book. But for those of you who need to understand the fundamentals, "Computer Security Basics" is still the best book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For novice security administrators, system administrators, and developers, "Computer Security Basics" offers a clear overview of the security concepts you need to know: access controls, malicious software, security policy, cryptography, biometrics, and government regulations and standards. And it does so in a way that you can easily understand, even if you aren't very familiar with security. This is the must-have book for a must-know field. |
|
Reader Reviews From Amazon (Ranked by 'Helpfulness') Average Customer Rating: |  | based on 11 reviews. |
The Title Says It All, 2007-04-04 | Reviewer rating: |  |
| It's a good book for starters. Covers security concepts pretty well even for it's age being published in 1991 I believe. There's a lot of history and references. The author definately did her research. Other than being a starting point there are a lot of other good books out there to fill in the blanks and pickup where Computer Security Basics leaves off. Plus, you can read this book in a week or less. |
| Get your favorite clueless techie up to speed on security..., 2006-08-12 | Reviewer rating: |  |
| It still surprises me how many of my information technology colleagues still have no clue when it comes to computer security. This particular book is one I'd feel really good about when it comes to a recommendation to get them up to speed on the subject... Computer Security Basics (2nd Edition) by Rick Lehtinen, Deborah Russell, and G. T. Gangemi Sr.
Contents:
Part 1 - Security for Today: Introduction; Some Security History
Part 2 - Computer Security: Computer System Security and Access Controls; Viruses and Other Wildlife; Establishing and Maintaining a Security Policy; Web Attacks and Internet Vulnerabilities
Part 3 - Communications Security: Encryption; Communications and Network Security
Part 4 - Other Types of Security: Physical Security and Biometrics; Wireless Network Security
Part 5 - Appendixes: OSI Model; TEMPEST; The Orange Book, FIPS PUBS, and the Common Criteria
Index
While not a technical "how to" manual, this book does a great job in dealing with technical issues and concepts. Pretty much all the significant issues surrounding computer and technology security these days is covered in sufficient detail to allow for a functional understanding of the topics. For instance, the chapter on viruses would allow even the most clueless techie to grasp the problems. The authors distinguish between viruses, worms, trojan horses, bombs, and other various nasty surprises. The history is valuable to understand how we got into this condition, and by the end of the chapter you'll know what you need to do to start to combat the problem. From there, you can dive into the more technical details of any one of the areas that pertain to your particular situation.
For a subject that could be painfully dry without much effort, Lehtinen et al. do an admirable job in keeping the reader engaged and involved. If you're trying to educate someone who hasn't kept up with the topic of computer security, this would be a very good starting point... |
| Great computer security book for absolute beginners, 2006-06-17 | Reviewer rating: |  |
| This book is the long awaited second edition of a classic book in basic computer security. It is an introduction to the field, not a technical reference. If you need details on a particular aspect of computer security, you should refer to another more specialized book. Since Amazon does not show the table of contents, I review this book in reference to its table of contents:
Part I, SECURITY FOR TODAY
Chapter 1, Introduction
Introduces computer security: what it is and why it's important. It summarizes the threats to computers and the information stored on them, and it introduces the different types of computer security. It notes that if you ignore computer security you could not only be a crime victim but an unwitting partner in crime.
Chapter 2, Some Security History
Describes how we got to where we are today. It summarizes key events in the history of computer security, discusses some of the government standards and programs involved with computer security, and introduces the concept of computer databases and the preservation of privacy.
Part II, COMPUTER SECURITY
Chapter 3, Computer System Security and Access Controls
Introduces computer system security and describes how it controls access to systems and data.
Chapter 4, Viruses and Other Wildlife
Explores viruses, worms, Trojans, and other types of malicious code. The financial effects of malicious programs are discussed first, including that of wasted time. Next it equates viruses and public health - in that once your computer is infected others can be too using your computer as a jumping off point. The history of viruses is also discussed, including the fact that today's viruses and worms are basically malware written by malicious individuals, not computer scientists exploring the limits of technology as was once the case. Remedies, and more importantly, prevention is discussed.
Chapter 5, Establishing and Maintaining a Security Policy
Describes the administrative procedures that improve security within an organization and the three general categories of administrative security. It also introduces business continuity and disaster recovery as part of security. It also introduces the large numbers of laws now on the books relating to computer security, many that carry heavy fines in case of violation. It also mentions that it is important to implement separation of duties so no one person carries the load of security-related tasks.
Chapter 6, Web Attacks and Internet Vulnerabilities
This chapter deals with the basics of the Internet and the Web, as well as several important Internet protocols that keep the Internet humming from behind the scenes. The chapter then discusses vulnerabilities of several of these services, as well as exploits that can be used to attack them. Finally, this chapter gives several suggestions of how users can defend against those who misuse the Internet to steal or annoy.
Part III, COMMUNICATIONS SECURITY
Chapter 7, Encryption
This chapter explains what encryption is and how it protects data. The chapter discusses encryption definition and history. It also discusses DES (the Data Encryption Standard), as well as listing the acronyms of many other encryption algorithms. The chapter also defines message authentication, and lists several government cryptographic programs as well as mentioning cryptographic export restrictions.
Chapter 8, Communications and Network Security
Introduces network concepts and discusses some basic communications security issues. These issues include what makes communications secure, and the definition of modems, networks, and network security. Appropriate steps to keep your computer network safe from attack are outlined.
Part IV, OTHER TYPES OF SECURITY
Chapter 9, Physical Security and Biometrics
Introduces physical security and describes different types of biometric devices. Physical security is largely a system of common sense precautions and photo IDs, where biometrics is a new science where an individual's retina patterns, iris patterns, voice patterns, signatures, and keystroke patterns are measured and identified.
Chapter 10, Wireless Network Security
Describes the workings of wireless networks and the security ramifications of this access medium. Shows that although wireless computing is very convenient, it opens up a whole new world to hackers. Proper antenna selection to keep radio signals confined to the appropriate area is discussed. Careful attention to network cabling--all wireless networks end up connecting to a wired network at some point--also help assure security for the wireless environment.
In summary, this is a great little book for those just entering the field of computer security, as well as individual computer users who want to learn how to not be the weak link in either their professional or home network. It carefully defines terms and even has some good general advice on securing your computer and your network, but you should consult other books for details. I highly recommend it to the beginner who is interested in the field. |
| Less Than Basic Basics Fails To Keep Up To Date, 2001-04-23 | Reviewer rating: |  |
| The problem all computer books have is that they are almost out of date before they reach the bookstore as things change so quickly and unfortunately this 10 year old book, although okay for the casual reader who may want an understanding of security generally, is a dinosaur concentrating on old technologies, orange book concepts and not even touching on modern problems like distributed denial of service, e-mail viruses etc. Very disappointing for an O'Reilly book. An update is long overdue. |
| Best available introduction to the topic..., 2001-04-19 | Reviewer rating: |  |
| This book is a more introductory, and a more theoretical than something like "Practical UNIX & Internet Security, 2nd Edition" (By Simson Garfinkel & Gene Spafford, published by O'Reilly & Assoc.), but it is still a vital book on the topic. Definitely a must-have for the bookshelf of any Unix or Security administrator, and a good idea for anyone to read if they are working in the IT field. |
|
Some information above was provided using data from Amazon.com. View at Amazon > |
| |
|
|