The Stephen Cobb complete book of PC and LAN security
Author(s)
Bibliographic Information
The Stephen Cobb complete book of PC and LAN security
Windcrest, c1992
1st ed
- : pbk
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references (p. 546) and index
Description and Table of Contents
- Volume
-
: pbk ISBN 9780830632800
Description
Computer viruses and security leaks make the news almost every month. Local area networks are particularly vulnerable, in less than one second, a tiny virus can erase megabytes of data and wipe out weeks of work performed by dozens of people. Now Stephen Cobb has compiled a complete guide to PC and LAN security, covering everything computer users need to guard their systems from today's most common threats. Cobb explains how to protect hardware through multiple means, including alarm and security systems, product registration and insurance, fault tolerance, and more. He covers software protection, discussing encryption systems, passwords, add-ons, alternative power supplies, and back-up strategies. Then, a final section focuses on securing networks against unwanted intruders, with an entire chapter devoted to virus prevention.
Table of Contents
- Part 1 Securing hardware: the need for security
- securing the hardware
- controlling access to your micro
- fault tolerance and redundancy for micro systems. Part 2 Securing software: controlling file access
- file backup
- power backup
- software piracy. Part 3 The bigger picture: network security
- data transmission
- outside lines
- hackers and other intruders
- the virus problem
- future developments.
- Volume
-
ISBN 9780830692804
Description
Computer viruses and security leaks make the news almost every month, with local area networks being particularly vulnerable. In less than one second, a tiny virus can erase megabytes of data and wipe out weeks of work performed by dozens of people. Now Stephen Cobb has compiled a complete guide to PC and LAN security, covering everything computer users need to guard their systems from today's most common threats. Cobb explains how to protect hardware through multiple means, including alarm and security systems, product registration and insurance, fault tolerance, and more. He covers software protection, discussing encryption systems, passwords, add-ons, alternative power supplies, and back-up strategies. Then, a final section focuses on securing networks against unwanted intruders, with an entire chapter devoted to virus prevention.
Table of Contents
- Part 1 Securing hardware: the need for security
- securing the hardware
- controlling access to your micro
- fault tolerance and redundancy for micro systems. Part 2 Securing software: controlling file access
- file backup
- power backup
- software piracy. Part 3 The bigger picture: network security
- data transmission
- outside lines
- hackers and other intruders
- the virus problem
- future developments.
by "Nielsen BookData"