AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Have You Locked the Castle Gate?: Home and Small Business Computer Security

Please fill out form in order to compare prices
Title: Have You Locked the Castle Gate?: Home and Small Business Computer Security
by Brian Shea
ISBN: 0-201-71955-X
Publisher: Addison-Wesley Pub Co
Pub. Date: 15 April, 2002
Format: Paperback
Volumes: 1
List Price(USD): $19.99
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.5 (4 reviews)

Customer Reviews

Rating: 5
Summary: Great intro to computer security--recommended
Comment: Not a techy-geeky type? When someone says "Linux" do you think of a Charles Schulz character with a security blanket? If that's you, you may profit from Brian Shea's excellent introduction to computer security.

Shea uses the same metaphor we use at home to explain security to the novice computer user--a home or a castle, with doors, windows and locks. Viewing security the way you view locking up a house is helpful to visualize the concepts of firewalls.

In addition, there is a fine chapter on how to set up your email accounts to avoid spam and how to get rid of spam (not easy, admittedly) coming in existing accounts.

Highly recommended for the average computer user.

Rating: 4
Summary: Good intro to security for management & non-technical users
Comment: Computer security is not rocket science, but it is often so hard to secure a computer, that is seems like rocket science. Have You Locked the Castle Gate? Home and Small Business Computer Security is a book made for the average user, who may not be so technical, yet wants to have a somewhat secure computer.

The book is short on theory and get straight to the point with specific and practical ways to secure a system.

This book outlines the fundamental concepts and techniques for most users. The book details the most common security issues facing users and small businesses today.

The reader won't be a security guru after reading the book, but will be familiar with concepts such as encryption, authentication, viruses and worms, registry, event logs and more.

Those looking for a to the point book on what they need to know about home and small business security for their computers will find significant value in the book.

Rating: 4
Summary: Effective security for the non-technical user
Comment: Computer security is an area where everyone knows it is important, but almost everyone puts it secondary to the critical functionality. The only times it seems to be critical is after events such as the Nimda or Melissa attacks. I am someone who rarely raises a voice in defense of Microsoft, but even as a monopoly, they must respond to customer desires. And for years, those desires have been for functionality, with only a few people raising the issue of security. Therefore, it can honestly be said that not all of the problems of computer security rest on the expansive shoulders of the group from Redmond.
Now, it appears that everyone from Bill Gates on down to the novice user are beginning to consider computer security to be a far more serious issue. The group targeted by this book is the one on the lower end of the scale. Written for the non-technical user, it is a description of the dangers that lurk in the nether worlds of cyber space and what you can do on your machines to raise the barriers to external penetration. Using only the minimal amount of technical jargon, the authors communicate information on how to do things like change the file sharing settings, alter system permission settings and increase your Internet security. Detailed, clear explanations of software such as virus scanners and firewalls are also given.
The unique feature of the book is the analogy of an individual starting with an individual home and building security fences and solid walls to keep out the wild things that would kill him or his livestock. The story progresses through the development of a town and then a security alliance between several towns. This growing community and the security features that are developed are used as the analogy as the description moves from how to secure an isolated computer to one that is active on the Internet 24/7. The analogy works very well, showing the novice reader where all of the security points fit in as you begin to connect to additional computers.
Viruses and other destructive forms of software survive largely because local users do not perform simple actions to render them inoperable, or reduce their ability to propagate. Therefore, everyone connected to any other computer in any way has a personal and social obligation to do their part in the battle against these forces. In this book, you will learn what the dangers are and how a non-technical person can do their part. Think of it as the cyber equivalent of learning to cover your mouth when you cough or sneeze.

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache