The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

Stopping with this site

I am stopping with this site. If you want to take over the site with domain name get in touch, e-mail address below.

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last

Shop for this book
Book description
Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.
I want to add my review for this book!
Reviews (2) and details of Wireless Security

Shop for this book
The primary audience described in the introduction seems to be security professionals. However, system administrators, technology managers, and CIOs are mentioned as well. The attempt at breadth of coverage usually does not bode well in works like these. Chapter one discusses an information security model based upon the business (and other) objectives of the institution in question. While valid as far as it goes, and even possibly helpful when formulating security policy, this by no means provides a structure from which to view either security policy or procedures, let alone implement a complex set of controls. The widget company, beloved of management writers, is described in chapter two. For the purposes of assessing security in re... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Microsoft Windows Nt 4.0 Security, Audit, and Control (Microsoft Technical Reference)

Shop for this book
Book description
Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference.
I want to add my review for this book!
Reviews (2) and details of Windows Nt Security Guide

Shop for this book
Book description
Although Windows NT is the first mainstream desktop operating system to put security first, confusion remains about how to harness its full potential. This authoritative guide provides essential information on how to tap the sophisticated security capabilities of the Windows NT Operating System. Written by one of the world's foremost systems experts and cosponsored by the National Computer Security Association (NCSA), it succinctly addresses how to design and administer secure NT networks-including setting up, using, and managing security within NT workstation and server-and securely integrating some of the most popular NT server add-ons, such as Microsoft NT BackOffice. Making existing NT networks more secure is also covered. The book's pr... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Windows Nt Security: A Practical Guide to Securing Windows Nt Servers and Workstations (McGraw-Hill Ncsa Guides)

Shop for this book
Book description
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirementsFinally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast!Once security policies are written, they must be treated as living docume... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Writing Information Security Policies
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2022 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement