The Myth of the Secure OS The Myth of the Secure OS

The Myth of the Secure OS

Publisher Description

The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these books help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical managers, computer security novices, and systems administrators looking to broaden their knowledge.


Every tool has its use and every operating system has its role.  Selecting an operating system is a critical decision which can effect the capabilities and security posture of a network for years to come.  The Myth of the Secure OS addresses the strengths and weaknesses of the major operating systems, aligning them with common capabilities or computing needs.  The goal of this book is not to sway towards one OS or another, but to emphasize that each OS has its own Yin and its own Yang.

  • GENRE
    Computing & Internet
    RELEASED
    2012
    17 December
    LANGUAGE
    EN
    English
    LENGTH
    80
    Pages
    PUBLISHER
    Michael reeves
    PROVIDER INFO
    Michael Reeves
    SIZE
    13.3
    MB
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Lucrarea autentică Lucrarea autentică
    2025
    Hòa thuận với Đức Chúa Trời Hòa thuận với Đức Chúa Trời
    2026
    Predigen mit Gott im Zentrum Predigen mit Gott im Zentrum
    2025
    Îndreptățit înaintea lui Dumnezeu Îndreptățit înaintea lui Dumnezeu
    2025
    Fariseos evangélicos Fariseos evangélicos
    2023
    The InfoSec Handbook The InfoSec Handbook
    2014
    How to Recover Files from USB Flash Drive on Mac or Windows How to Recover Files from USB Flash Drive on Mac or Windows
    2013
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012
    Security in Computer and Information Sciences Security in Computer and Information Sciences
    2018
    Rethinking the Internet of Things Rethinking the Internet of Things
    2014
    Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
    2017