Complete Book of P.C. and L.A.N. Security
Seiten
1992
TAB Books Inc (Verlag)
978-0-8306-3280-0 (ISBN)
TAB Books Inc (Verlag)
978-0-8306-3280-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
A guide to PC and LAN security, covering everything computer users need to guard their data and hardware and software systems from today's most common threats.
Computer viruses and security leaks make the news almost every month. Local area networks are particularly vulnerable, in less than one second, a tiny virus can erase megabytes of data and wipe out weeks of work performed by dozens of people. Now Stephen Cobb has compiled a complete guide to PC and LAN security, covering everything computer users need to guard their systems from today's most common threats. Cobb explains how to protect hardware through multiple means, including alarm and security systems, product registration and insurance, fault tolerance, and more. He covers software protection, discussing encryption systems, passwords, add-ons, alternative power supplies, and back-up strategies. Then, a final section focuses on securing networks against unwanted intruders, with an entire chapter devoted to virus prevention.
Computer viruses and security leaks make the news almost every month. Local area networks are particularly vulnerable, in less than one second, a tiny virus can erase megabytes of data and wipe out weeks of work performed by dozens of people. Now Stephen Cobb has compiled a complete guide to PC and LAN security, covering everything computer users need to guard their systems from today's most common threats. Cobb explains how to protect hardware through multiple means, including alarm and security systems, product registration and insurance, fault tolerance, and more. He covers software protection, discussing encryption systems, passwords, add-ons, alternative power supplies, and back-up strategies. Then, a final section focuses on securing networks against unwanted intruders, with an entire chapter devoted to virus prevention.
Part 1 Securing hardware: the need for security; securing the hardware; controlling access to your micro; fault tolerance and redundancy for micro systems. Part 2 Securing software: controlling file access; file backup; power backup; software piracy. Part 3 The bigger picture: network security; data transmission; outside lines; hackers and other intruders; the virus problem; future developments.
Erscheint lt. Verlag | 1.1.1992 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Gewicht | 1000 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-8306-3280-8 / 0830632808 |
ISBN-13 | 978-0-8306-3280-0 / 9780830632800 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95