The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last score: 2.0 ++---
Vote for this book

Shop for this book
Book description
Hackers know things that you don't. That's their edge. It's the reason that they are able to break into networks, leaving a path of destruction in their wake. This book discusses some of the tricks of the hacker trade -- things that are well known in the hacker community but all too foreign to the I/T support staff. The intention is to dispel some of the common myths and misconceptions surrounding computer network security which lead to vulnerabilities that hackers can exploit. Techniques and tools for defending against such attacks are also discussed.
I want to add my review for this book!
Reviews (2) and details of Inside Internet Security: What Hackers Don't Want You To Know score: 5.0 +++++
Vote for this book

Shop for this book
Book description
The explosive growth of the Internet, inherent flaws in its basic structure, and the need to transfer sensitive information for Internet applications like electronic mail, Internet banking and Internet commerce have resulted in serious security concerns. This dictionary provides authoritative definitions and descriptions of terms related to Internet security. The Internet Security Dictionary details over 1,800 terms and covers eight main areas: * Authentication, including biometrics, encryption/public key infrastructure, digital signatures, time-stamping, and certificate management * Encryption * Network-level security, including IP, IPSec, SHTTP, and SSL * Firewalls and remote management * Internet security policies, risk analysis, integra... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Internet Security Dictionary

Shop for this book
Book description
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. If information is our most important asset, then we must prepare ourselves for the task of protecting it properly. Information Security Management: Global Challenges in the New Millennium is a compilation of researchers and practitioners addressing issues, trends, and challenges facing the management of information security in the next millennium. The book focuses on aspects of information security planning, evaluation, design and implementation.
I want to add my review for this book!
Reviews (2) and details of Information Security Management : Global Challenges In the New Millennium

Shop for this book
Book description
A recent survey showed that 50% of businesses experienced attacks on their networks within the past year. 35% of those surveyed had losses that cost more than $1 million per security attack. -Computer World With reports like this appearing almost daily, security has become the number one concern for NT users. To address the concern, security expert and Windows NT Magazine news editor Mark Edwards provides the quintessential guide to Internet and intranet security from the Windows NT platform. Comprehensive in scope, the book covers network security basics, Internet Information Server, Microsoft Proxy Server, and includes specific advice on selecting NT tools and security devices.
I want to add my review for this book!
Reviews (2) and details of Internet Security With Windows NT

Shop for this book
This is a big book--more than 850 pages. And the type is small, too. It has precisely what's needed to pack a comprehensive resource on Internet security into a single volume. The authors don't waste space on philosophizing or lecturing about security--they simply lay out what a site manager needs to know, beginning with the basics of TCP/IP. The book presents a five-part approach. Part one deals with security management, including TCP/IP, daemons, UUCP, and audit trails. Part two switches perspectives to that of the intruder, showing ways of gaining illicit accesses and how attempts to do so can be thwarted. Part three examines the challenges of creating secure channels for messaging. Part four shows how to deal with security concerns rais... Rest of this review on the detail page
(Review by
I want to add my review for this book!
Reviews (3) and details of Internet Security Professional Reference
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement