The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense

The Path of Least Resistance: Computer Security Is Common Sense

Volume 3

Descrição da editora

The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these books help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical managers, computer security novices, and systems administrators looking to broaden their knowledge.


The Path of Least Resistance approaches network defense by addressing the methodology of attacking a network.  Attackers plan their attacks to be swift and targeted to minimize the chance of being caught.  By identifying the weakest links and hardening them, the entire chain-mail of security is more resilient.

  • GÊNERO
    Computadores e Internet
    LANÇADO
    2012
    18 de novembro
    IDIOMA
    EN
    Inglês
    PÁGINAS
    33
    EDITORA
    Michael Reeves
    VENDEDOR
    Michael Reeves
    TAMANHO
    10
    MB
    The Myth of the Secure OS The Myth of the Secure OS
    2012
    Security Vs. Convenience Security Vs. Convenience
    2012
    Conflicts of Interest Conflicts of Interest
    2012
    Lucrarea autentică Lucrarea autentică
    2025
    Predigen mit Gott im Zentrum Predigen mit Gott im Zentrum
    2025
    Îndreptățit înaintea lui Dumnezeu Îndreptățit înaintea lui Dumnezeu
    2025
    Information Security Management - ITP 370 Information Security Management - ITP 370
    2014
    Hacked?! Hacked?!
    2015
    Protecting Virtual Datacenters Protecting Virtual Datacenters
    2012
    The State of Risk-Based Security Management The State of Risk-Based Security Management
    2012
    Computer Tutor Computer Tutor
    2012
    Anatomy of a Phish Anatomy of a Phish
    2014