Computer security sourcebook / edited by Wilma R. Caldwell.

Contributor(s): Caldwell, WilmaMaterial type: TextTextSeries: Security reference series: Publisher: Detroit, MI : Omnigraphics, c2003Edition: 1st edDescription: xiv, 514 p. ; 24 cmISBN: 0780806484; 9780780806481Subject(s): Computer security | Computer networks -- Security measuresAdditional physical formats: Online version:: Computer security sourcebook.DDC classification: 005.8 LOC classification: QA76.9.A25 | C658 2003
Contents:
Basic principles of computer security. Seven simple computer security tips for small business and home computer users -- Computer system security : let's get personal --Computer hardware hardware security. Security of hard drives -- Theft of laptops -- Insecure modems -- Choosing a medium for backup data storage -- Software-related threats to computer security. How computer viruses work -- The threat of internet worms -- Personal digital assistant (PDA) viruses : nothing to worry about? -- Dangerous downloads : entertainment programs may switch your internet connection -- Beware of modem dialer software which calls overseas without your OK -- E-mail pitfalls : viruses, forged messages, and privacy concerns -- Web bugs : frequently asked questions and privacy issues -- Avoiding software design flaw-related threats -- Next generation virtual private networks : promises hard to keep, forecasts hard to meet -- How software can allow hackers access to your computer -- Preventing damage from software-related threats and hackers. The internet : business blessing or terrorist tool? -- Cyberterrorism (information warfare) : risks and prevention -- Hacking and cracking take on new National Security implications -- Stop hackers by avoiding these common mistakes -- Avoiding weak passwords, selecting good ones -- Trust but verify : a guide to securing computers from malicious codes in e-mail -- Personal firewalls : one more step toward comprehensive security -- Children's online safety. Children's privacy and safety on the internet -- How to protect kid's privacy online -- Protecting your child from online predators -- Children's Internet Protection Act -- Banking and financial security issues. E-commerce and you : online shopping tips -- A consumer's guide to e-payments : keeping your transactions safe and secure -- Protecting financial privacy in the new millennium : the burden is on you -- Choosing a company that will protect your financial privacy -- Understanding privacy policies -- Consumer credit file privacy : the real deal -- An overview of internet fraud for the consumer -- Anti-fraud systems : a necessity for e-retailers -- Online investment opportunities : avoiding fraudulent promoters and sites -- How facial recognition systems work -- Biometrics : ready for information technology prime time -- Smartcards : how soon is now? -- Other personal privacy issues online. Intellectual property and the National Information Infrastructure -- Unsolicited e-mail : information about hoaxes, urban legends, chain letters, and warnings -- Unsolicited e-mail : information about e-mail chain scams and give-away hoaxes -- Unsolicited e-mail : junk e-mail, bulk e-mail, and other spam -- Pretexting : your personal information revealed -- Technology spurs rise in identity theft -- The U.S. Attorney General's report on cyberstalking --
Information about encryption and cryptography. Encrypted Communication Privacy Act summary -- Free and inexpensive security software for encryption -- Pretty Good Privacy (PGP) overview -- Digital signatures : what can businesses and consumers expect? -- Why cryptography is harder than it looks -- Steganography (information hiding) : definition and history -- Government, workplace, and commercial online surveillance. Software snags crooks, sneaking spouses, but alarms privacy advocates -- The trouble with spyware and advertising-supported software -- How Carnivore works -- Frequently asked questions (FAQ) about ECHELON -- Total Information Awareness (TIA) : the Pentagon's new surveillance initiative -- How internet cookies work -- Data mining : an introduction to how businesses use the data they collect -- The USA Patriot Act : new authorities relating to computer crime and electronic evidence -- Employee monitoring : is there privacy in the workplace? -- Additional help and information. Resources for software bugs, security holes, and program patches -- Computer security software programs and resources -- Publications devoted to online computer security -- Public and private computer security and privacy organizations -- Government computer security resource agencies -- Anti-spam resources -- Privacy options resources.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Book Longview campus
Stacks - 3rd Floor
QA76.9.A25 C658 2003 (Browse shelf) Available 0000001647163

Includes bibliographical references and index.

Basic principles of computer security. Seven simple computer security tips for small business and home computer users -- Computer system security : let's get personal --Computer hardware hardware security. Security of hard drives -- Theft of laptops -- Insecure modems -- Choosing a medium for backup data storage -- Software-related threats to computer security. How computer viruses work -- The threat of internet worms -- Personal digital assistant (PDA) viruses : nothing to worry about? -- Dangerous downloads : entertainment programs may switch your internet connection -- Beware of modem dialer software which calls overseas without your OK -- E-mail pitfalls : viruses, forged messages, and privacy concerns -- Web bugs : frequently asked questions and privacy issues -- Avoiding software design flaw-related threats -- Next generation virtual private networks : promises hard to keep, forecasts hard to meet -- How software can allow hackers access to your computer -- Preventing damage from software-related threats and hackers. The internet : business blessing or terrorist tool? -- Cyberterrorism (information warfare) : risks and prevention -- Hacking and cracking take on new National Security implications -- Stop hackers by avoiding these common mistakes -- Avoiding weak passwords, selecting good ones -- Trust but verify : a guide to securing computers from malicious codes in e-mail -- Personal firewalls : one more step toward comprehensive security -- Children's online safety. Children's privacy and safety on the internet -- How to protect kid's privacy online -- Protecting your child from online predators -- Children's Internet Protection Act -- Banking and financial security issues. E-commerce and you : online shopping tips -- A consumer's guide to e-payments : keeping your transactions safe and secure -- Protecting financial privacy in the new millennium : the burden is on you -- Choosing a company that will protect your financial privacy -- Understanding privacy policies -- Consumer credit file privacy : the real deal -- An overview of internet fraud for the consumer -- Anti-fraud systems : a necessity for e-retailers -- Online investment opportunities : avoiding fraudulent promoters and sites -- How facial recognition systems work -- Biometrics : ready for information technology prime time -- Smartcards : how soon is now? -- Other personal privacy issues online. Intellectual property and the National Information Infrastructure -- Unsolicited e-mail : information about hoaxes, urban legends, chain letters, and warnings -- Unsolicited e-mail : information about e-mail chain scams and give-away hoaxes -- Unsolicited e-mail : junk e-mail, bulk e-mail, and other spam -- Pretexting : your personal information revealed -- Technology spurs rise in identity theft -- The U.S. Attorney General's report on cyberstalking --

Information about encryption and cryptography. Encrypted Communication Privacy Act summary -- Free and inexpensive security software for encryption -- Pretty Good Privacy (PGP) overview -- Digital signatures : what can businesses and consumers expect? -- Why cryptography is harder than it looks -- Steganography (information hiding) : definition and history -- Government, workplace, and commercial online surveillance. Software snags crooks, sneaking spouses, but alarms privacy advocates -- The trouble with spyware and advertising-supported software -- How Carnivore works -- Frequently asked questions (FAQ) about ECHELON -- Total Information Awareness (TIA) : the Pentagon's new surveillance initiative -- How internet cookies work -- Data mining : an introduction to how businesses use the data they collect -- The USA Patriot Act : new authorities relating to computer crime and electronic evidence -- Employee monitoring : is there privacy in the workplace? -- Additional help and information. Resources for software bugs, security holes, and program patches -- Computer security software programs and resources -- Publications devoted to online computer security -- Public and private computer security and privacy organizations -- Government computer security resource agencies -- Anti-spam resources -- Privacy options resources.

Reviews provided by Syndetics

CHOICE Review

This resource consolidates a broad spectrum of security topics associated with computer hardware and software, e-mail, and Internet access. Security threats and their countermeasures, technology for enhancing security, and resources for additional security-related information are among its many useful features. The book consists of ten parts, each with multiple chapters; the parts cover broad interest areas and the chapters describe specific topics within the area. This structure makes it very easy for the reader to locate items of interest by scanning the table of contents. The book's material comes from documents and publication excerpts from multiple sources that have been skillfully edited, organized, and presented in an easily comprehensible fashion. An extensive glossary and index further enhance the book's utility as a reference volume. Although the contents are reasonably current, the continual and frequent introduction of new Internet viruses and other forms of security threats represents a challenge for any book of this sort. ^BSumming Up: Highly recommended. General readers. E. M. Aupperle emeritus, University of Michigan

There are no comments on this title.

to post a comment.