The Stephen Cobb complete book of PC and LAN security

Bibliographic Information

The Stephen Cobb complete book of PC and LAN security

Stephen Cobb

Windcrest, c1992

1st ed

  • : pbk

Available at  / 1 libraries

Search this Book/Journal

Note

Includes bibliographical references (p. 546) and index

Description and Table of Contents

Volume

: pbk ISBN 9780830632800

Description

Computer viruses and security leaks make the news almost every month. Local area networks are particularly vulnerable, in less than one second, a tiny virus can erase megabytes of data and wipe out weeks of work performed by dozens of people. Now Stephen Cobb has compiled a complete guide to PC and LAN security, covering everything computer users need to guard their systems from today's most common threats. Cobb explains how to protect hardware through multiple means, including alarm and security systems, product registration and insurance, fault tolerance, and more. He covers software protection, discussing encryption systems, passwords, add-ons, alternative power supplies, and back-up strategies. Then, a final section focuses on securing networks against unwanted intruders, with an entire chapter devoted to virus prevention.

Table of Contents

  • Part 1 Securing hardware: the need for security
  • securing the hardware
  • controlling access to your micro
  • fault tolerance and redundancy for micro systems. Part 2 Securing software: controlling file access
  • file backup
  • power backup
  • software piracy. Part 3 The bigger picture: network security
  • data transmission
  • outside lines
  • hackers and other intruders
  • the virus problem
  • future developments.
Volume

ISBN 9780830692804

Description

Computer viruses and security leaks make the news almost every month, with local area networks being particularly vulnerable. In less than one second, a tiny virus can erase megabytes of data and wipe out weeks of work performed by dozens of people. Now Stephen Cobb has compiled a complete guide to PC and LAN security, covering everything computer users need to guard their systems from today's most common threats. Cobb explains how to protect hardware through multiple means, including alarm and security systems, product registration and insurance, fault tolerance, and more. He covers software protection, discussing encryption systems, passwords, add-ons, alternative power supplies, and back-up strategies. Then, a final section focuses on securing networks against unwanted intruders, with an entire chapter devoted to virus prevention.

Table of Contents

  • Part 1 Securing hardware: the need for security
  • securing the hardware
  • controlling access to your micro
  • fault tolerance and redundancy for micro systems. Part 2 Securing software: controlling file access
  • file backup
  • power backup
  • software piracy. Part 3 The bigger picture: network security
  • data transmission
  • outside lines
  • hackers and other intruders
  • the virus problem
  • future developments.

by "Nielsen BookData"

Details

Page Top