There's a lot more consciousness of security today, but not a lot of understanding of what it means and how far it should go. No one loves security, but most people---managers, system administrators and users alike---are starting to feel that they'd better accept it, or at least try to understand it.
For example, most U.S. Government equipment acquisitions now require "Orange Book" (Trusted Computer System Evaluation Criteria) certification. A lot of people have a vague feeling that they ought to know about the Orange Book, but few make the effort to track it down and read it. Computer Security Basics contains a more readable introduction to the Orange Book---why it exists, what it contains, and what the different security levels are all about---than any other book or government publication.
This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
Contents include:
"synopsis" may belong to another edition of this title.
Deborah Russell is an acquisitions editor for O'Reilly & Associates and also manages documentation consulting services for a joint venture of O'Reilly & Associates and Cambridge Computer Associates. In recent years, the focus of her consulting work has been computer security. Her consulting projects include work on the development of a secure UNIX kernel, several trusted operating systems, and a secure compartmented mode workstation. Ms. Russell has worked closely with a number of vendors during the "Orange Book" trusted system evaluation process. She has a degree from Harvard University and is currently developing additional books for O'Reilly & Associates on security and database topics. G.T. Gangemi, Sr., is Director of Wang Laboratories' Secure Systems Program. The Wang organization mirrors the structure of the U.S. government's Information Security (INFOSEC) program, encompassing computer security (COMPUSEC), communications security (COMSEC), TEMPEST, and physical access. Mr. Gangemi is responsible for all Wang security-related products designed for government and commercial use. He has previously held management positions at Wang in a variety of areas, including research and development, product management and marketing, account management, and business planning. He attended La Salle College and the Program for Senior Executives at Harvard University's Kennedy School of Government. He served in the U.S. Army and is a private pilot.
"About this title" may belong to another edition of this title.
FREE shipping within United Kingdom
Destination, rates & speeds£ 33.44 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: Goldstone Books, Llandybie, United Kingdom
paperback. Condition: Good. All orders are dispatched within one working day from our UK warehouse. We've been selling books online since 2004! We have over 750,000 books in stock. No quibble refund if not completely satisfied. Seller Inventory # mon0007111102
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Fair. A readable copy of the book which may include some defects such as highlighting and notes. Cover and pages may be creased and show discolouration. Seller Inventory # GOR001998611
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR003673811
Quantity: 1 available
Seller: Ammareal, Morangis, France
Softcover. Condition: Très bon. Ancien livre de bibliothèque. Couverture différente. Edition 1991. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Different cover. Edition 1991. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # E-505-772
Quantity: 1 available
Seller: Ammareal, Morangis, France
Softcover. Condition: Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Salissures sur la tranche. Edition 1991. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Stains on the edge. Edition 1991. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # E-843-034
Quantity: 1 available
Seller: Godley Books, Hyde, United Kingdom
Soft Cover. Condition: Very Good (+). First Edition. Name/date to front end paper. No other marks or inscriptions. Crease to spine and faint crease to upper front corner. A very clean very tight copy with bright unmarked boards and no bumping to corners. 441pp. A description of computer security concepts, cryptography, manadatory access control and biometrics. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9 x 6 inches. Seller Inventory # 027100
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. [Rev. ed.]. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 7540826-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. [Rev. ed.]. Used book that is in clean, average condition without any missing pages. Seller Inventory # 2616612-75
Quantity: 1 available
Seller: Victoria Bookshop, BERE ALSTON, DEVON, United Kingdom
Paperback. Condition: Very Good. 8vo. Book. Seller Inventory # 23198
Quantity: 1 available
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut | Seiten: 468 | Sprache: Englisch | Produktart: Bücher. Seller Inventory # 735262/202
Quantity: 1 available