The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense

The Path of Least Resistance: Computer Security Is Common Sense

Volume 3

Description de l’éditeur

The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these books help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical managers, computer security novices, and systems administrators looking to broaden their knowledge.


The Path of Least Resistance approaches network defense by addressing the methodology of attacking a network.  Attackers plan their attacks to be swift and targeted to minimize the chance of being caught.  By identifying the weakest links and hardening them, the entire chain-mail of security is more resilient.

  • GENRE
    Informatique et Internet
    SORTIE
    2012
    18 novembre
    LANGUE
    EN
    Anglais
    LONGUEUR
    33
    Pages
    ÉDITIONS
    Michael Reeves
    TAILLE
    10
    Mo
    Cybersecurity for Beginners Cybersecurity for Beginners
    2017
    Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security
    2020
    CompTIA CySA+ Study Guide CompTIA CySA+ Study Guide
    2023
    CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)
    2020
    OWNED: Why hacking continues to be a problem OWNED: Why hacking continues to be a problem
    2010
    Foundations of Information Security Foundations of Information Security
    2019
    Security Vs. Convenience Security Vs. Convenience
    2012
    The Myth of the Secure OS The Myth of the Secure OS
    2012
    Conflicts of Interest Conflicts of Interest
    2012
    Fariseos evangélicos Fariseos evangélicos
    2023
    Gente del evangelio Gente del evangelio
    2023
    Mit Gott im Reinen Mit Gott im Reinen
    2024
    Information Security Management - ITP 370 Information Security Management - ITP 370
    2014
    Administration: Configuration and Security Administration: Configuration and Security
    2013
    Hacked?! Hacked?!
    2015
    Protecting Virtual Datacenters Protecting Virtual Datacenters
    2012
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012
    Rethinking the Internet of Things Rethinking the Internet of Things
    2014