The Underground Guide to Computer Security

Slightly Askew Advice on Protecting Your PC and What's On It

Michael Alexander

Publisher: Addison-Wesley, 1996, 239 pages

ISBN: 0-201-48918-X

Keywords: IT Security

Last modified: June 6, 2021, 8:50 p.m.

How much backup is enough? If your computer is on a network, who can read your files? How long would it take to get your computer up and running again after a flood or lightning strikes? Security expert Michael Alexander (who has himself lost enough data to fill a small black hole) takes you step by step through the basics of practical computer security for everyone, whether you're on a LAN in an office, dialing up from your portable, or running your own small business on one machine. In The Underground Guide to Computer Security you'll learn how to:

  • Evaluate the many hardware and software options available to protect your computer and your data. You'll get expert advice on how to choose the best antivirus software, backup system, power protection gear, diagnostic utilities, and encryption programs.
  • Create hacker-proof passwords.
  • Keep your information safe — and private! — in a networked world. Get practical strategies to protect yourself from coworkers using the company LAN to snoop through your files as well as from professional information thieves on dial-up services and the Internet.
  • Develop simple back-up and disaster recovery plans that offer the right amount of information security for your needs.
  • And much more!

Every page has something you can use immediately. This book is packed wall to wall with hands-on advice, warnings, tips, virus alerts, workarounds, and the kind of nitty-gritty explanations that could only come from someone who eats, sleeps, and breathes computer security.

  1. Information Threats and Thieves
    • Everyone Should Feel Secure
    • We're Our Own Worst Enemy
    • The Threat from Within: Employees
    • The Threat from Outsiders
    • Putting a Value on Information
    • Risk Assessment Test
  2. Viruses, Worms, and Other Rouge Code
    • Computer Viruses
    • What in the Heck Is a Virus?
    • How Are PCs Infected?
    • Telltale Signs
    • Search and Destroy
    • Getting Rid of Viruses
    • How to Buy Antivirus Software
    • A Few More Words about Macs
    • Tips for Warding Off Cybermicrobes
    • Worms, Trojan Horses, and Logic and Time Bombs
    • You Probably Want to Ask…
    • Antivirus Software Sellers and Freebies
  3. Safe Desktops and Laptops
    • Controlling Access to Computer Systems
    • Identification and Authentication
    • The Last Word on Passwords
    • How to Create Hacker-Proof Passwords
    • One Factor, Two factors
    • Access Control Programs
    • Portable Computer Security
    • Control Over Remote Access
  4. Networks: 1000 Points of Fright
    • LAN
    • Entering the E-mail Dimension
    • Streamlined Sign-On
    • This Way to the I-way
    • Dialing for Dollars
  5. Secret Messages and Digital Hancocks
    • Encryption and Digital Envelopes
    • Digital John Hancocks
  6. Natural and Unnatural Disasters
    • Well-Laid Plans of Mice and Men
    • Things That Go Bump Day and Night
    • You've Got the Power, Maybe
    • Let's Get Physical
    • Cover Yourself with Insurance
    • The Agony, Not Ecstasy of Using PCs
  7. Lose It? Get It Back!
    • The Backup religion
    • Why Back Up?
    • Tape Me Up, Tape Me Down
    • If This Is Daily2, Then It Must Be Tuesday
    • Backup Strategies for Home Offices and Small Companies
    • Other Backup Options
    • Diagnostics, Recovery, and Other Useful Utilities
  8. Taking Care of Business
    • Make it a Policy to Protect Yourself
    • The Right and Wrong of Using Computers
    • What Else Goes in the Policy?
    • Get the Boss Behind the program
    • Computer Awareness Training
    • Computer Crime Statues
  1. PC and Mac Antivirus Software
  2. Computer Security Companies and Organizations
  3. Notes from the Virus Front

Reviews

The Underground Guide to Computer Security

Reviewed by Roland Buresund

OK ***** (5 out of 10)

Last modified: May 21, 2007, 3:18 a.m.

This could be a "Dummies Guide to…" type of book.

Funny, but very relevant book. Recommended as an introductionary text for new security officers.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required