Books & Videos

Table of Contents

  1. Security for Today

    1. Chapter 1 Introduction

      1. The New Insecurity
      2. What Is Computer Security?
      3. Threats to Security
      4. Why Buy Security?
      5. What’s a User to Do?
      6. Summary
    2. Chapter 2 Some Security History

      1. Information and Its Controls
      2. Computer Security: Then and Now
      3. Early Computer Security Efforts
      4. Building Toward Standardization
      5. Computer Security Mandates and Legislation
      6. Summary
  2. Computer Security

    1. Chapter 3 Computer System Security and Access Controls

      1. What Makes a System Secure?
      2. System Access: Logging into Your System
      3. Summary
    2. Chapter 4 Viruses and Other Wildlife

      1. Financial Effects of Malicious Programs
      2. Viruses and Public Health
      3. Viruses, Worms, and Trojans (Oh, My!)
      4. Who Writes Viruses?
      5. Remedies
      6. The Virus Hype
      7. An Ounce of Prevention
      8. Summary
    3. Chapter 5 Establishing and Maintaining a Security Policy

      1. Administrative Security
      2. Overall Planning and Administration
      3. Day-to-Day Administration
      4. Separation of Duties
      5. Summary
    4. Chapter 6 Web Attacks and Internet Vulnerabilities

      1. About the Internet
      2. What Are the Network Protocols?
      3. The Fragile Web
      4. Summary
  3. Communications Security

    1. Chapter 7 Encryption

      1. Some History
      2. What Is Encryption?
      3. The Data Encryption Standard
      4. Other Cryptographic Algorithms
      5. Message Authentication
      6. Government Cryptographic Programs
      7. Cryptographic Export Restrictions
      8. Summary
    2. Chapter 8 Communications and Network Security

      1. What Makes Communication Secure?
      2. Modems
      3. Networks
      4. Network Security
      5. Summary
  4. Other Types of Security

    1. Chapter 9 Physical Security and Biometrics

      1. Physical Security
      2. Locks and Keys: Old and New
      3. Biometrics
      4. Gentle Reminder
      5. Summary
    2. Chapter 10 Wireless Network Security

      1. How We Got Here
      2. Today’s Wireless Infrastructure
      3. How Wireless Works
      4. Playing the Fields
      5. What Is This dB Stuff?
      6. Why Does All This Matter?
      7. Encouraging Diversity
      8. Physical Layer Wireless Attacks
      9. Summary
  5. Appendixes

    1. Appendix OSI Model

    2. Appendix TEMPEST

      1. The Problem of Emanations
      2. The TEMPEST Program
      3. TEMPEST Standards
      4. Hard As You Try
    3. Appendix The Orange Book, FIPS PUBS, and the Common Criteria

      1. About the Orange Book
      2. Rating by the Book
      3. Summary of Orange Book Classes
      4. FIPS by the Numbers
      5. I Don’t Want You Smelling My Fish
  1. Colophon