Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometric Date: 28 April 2011, 04:00
|
Free register and download UseNet downloader, then you can FREE Download from UseNet.
Download without Limit " Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometric " from UseNet for FREE!
Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometrics, which By Michael Seese * Publisher: Happy About * Number Of Pages: 212 * Publication Date: 2009-05-26 * ISBN-10 / ASIN: 1600051324 * ISBN-13 / EAN: 9781600051326 Product Description: The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes. Modern corporations do their best to hammer home the message of security through training, communications, and outright begging. The message often falls on deaf ears, not because employees want to make their workplaces unsafe, but rather, because the topic is so complex and wide-ranging that it simply is overwhelming. As an information security professional, it is my charge to make the online world safer for all of us. None of us tolerates a crime spree in our neighborhood. Likewise, we should not tolerate the current crime wave that is sweeping the Internet, one which truly threatens to stifle the e-commerce and e-communications that we have come to know and rely on. They say a little knowledge is a dangerous thing. I agree. People need more than a little knowledge to be safe online. They need to understand how encryption, the Internet, and wireless work so that they can put the pieces together -- literally like a jigsaw puzzle -- to reveal the image of a more secure online world. It is my goal to craft those pieces in such a way that the average reader will understand these technologies, and therefore understand how to apply them to both their corporate and personal cyberselves. This book should be read by anyone who cares about the security and privacy of their online information, and wants to know how to take steps to protect it ... and that should be everyone. This book should be read by anyone who wants to "do the right thing" and ensure that they do not inadvertently compromise their employer's, or their own, sensitive information ... and that should be everyone. This book should be read by anyone who believes that crime is crime, it should be stopped, and wants to know what concrete steps he or she can be take to reduce cybercrime and minimize its impacts ... and that should be everyone. Summary: Great book for the security indimidated Rating: 5 I've finally found a book I can strongly recommend to those people that ask the most basic security questions. As a security professional, there are some great books out there for readers that already have a basic grasp of security, especially when it comes to the Internet. But I've struggled to find a book to recommend to those individuals that would get overwhelmed by the major of existing Internet security books. Michael Seese has filled this gap. His text simply and in plain, easy to understand common language, walks users through important security concepts such as phishing, password management, multi-factor authentication and safe Internet surfing. I whole heartedly recommend this book to those looking for that straight forward, simple explanation of the most important day to day security concepts. A great security awareness text indeed! Summary: I Used to Feel Safe Using My Computer Rating: 5 Before I edited Michael's book I felt fairly safe using my computer. I even entered my credit card number to purchase items without having a chill run up my spine. No more! His easy to understand tour through the terrors of cyberspace have left a scar on my psyche. There are thicker books out there on this topic, but unless you're a cyber-jock, this book is a great introduction to cyber security for individuals and businesses. I'm a scientist by education, with a masters degree in physics and undergrad degrees in chemistry and physics. I certainly COULD understand all of the jargon, but I've got better things to do. And I wouldn't have bothered to support this book as a Scrappy Guide(R) unless I was sure it was an essential guide to getting results in the real world. Summary: Practical, Hands-On Advice Rating: 5 Simply put, this is a very good book. If you have ever felt vulnerable to those online bad guys who could, at any time, unbeknownst to you, be stealing your password, your credit card number, or that critical database at work, then THIS is the book to read. For each potential threat, the author explains how they "get you" and what you can do about it. For each security measure, he explains why it is important and how to use it to its best advantage. But the difference between this book and the dreaded manuals that come from hardware or software companies is that it is written in easy-to-understand, conversational language with ample doses of humor and clever analogies to keep you smirking as you learn. (Technobabble is the domain of propeller heads and a firewall is like the bouncer at a rock club.) This is an information-packed reference book, but it is also just a darn good read. Summary: Not for experts only Rating: 5 When Michael Seese asked me to do a preliminary editing job on a book about Information Security, I said, "yes," even though I had all but the faintest notion of the subject matter. That was before I read Scrappy Information Security. Michael explained why I have to see a picture of a cow before I can log into my online bank account. I now know the reason I have to retype random, melting strings of numbers and letters into text boxes before the car payment people will send me my password when I forget it each month. The biggest strength of this book is that Michael explains the different types and levels of Information Security simply and with understandable and highly-entertaining examples. If you need to put together a training program on Information Security for your business or organization; if you want to learn about the latest scams and the most common sorts of information theft: or if you just want to know why using your birthday as a password is just asking for trouble, Scrappy Information Security does all that and more. With all the bad guys cruising the information super highway, experts and laymen can both benefit from what's in this book. Bill Devol June 26, 2009 Summary: Informative yet informal Rating: 5 Michael Seese's "Scrappy" book about information security is an informal, yet succinct set of instructions and examples about information security topics ranging from physical security of business information systems to advice for avoid identity theft. It conveys all of the information needed for a solid groundwork in the information security field without becoming an uninteresting, overweight tome suitable only for double-duty as a doorstop. His engaging writing style draws the reader into what could have been a dry, boring topic by making it interesting and useful, often citing current cultural references to enforce his points. For those who deal with information technology, whether as informally as being a home computer user, or as formally as an IT careerist, his book is a useful and careful analysis of information security.
|
DISCLAIMER:
This site does not store Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometric on its server. We only index and link to Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometric provided by other sites. Please contact the content providers to delete Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometric if any and email us, we'll remove relevant links or contents immediately.
|
|
|