The Myth of the Secure OS The Myth of the Secure OS

The Myth of the Secure OS

Publisher Description

The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these books help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical managers, computer security novices, and systems administrators looking to broaden their knowledge.


Every tool has its use and every operating system has its role.  Selecting an operating system is a critical decision which can effect the capabilities and security posture of a network for years to come.  The Myth of the Secure OS addresses the strengths and weaknesses of the major operating systems, aligning them with common capabilities or computing needs.  The goal of this book is not to sway towards one OS or another, but to emphasize that each OS has its own Yin and its own Yang.

  • GENRE
    Computers & Internet
    RELEASED
    2012
    December 17
    LANGUAGE
    EN
    English
    LENGTH
    80
    Pages
    PUBLISHER
    Michael reeves
    SELLER
    Michael Reeves
    SIZE
    13.3
    MB
    LINUX: Beginner's Crash Course. Your Step-By-Step Guide To Learning The Linux Operating System And Command Line Easy & Fast! LINUX: Beginner's Crash Course. Your Step-By-Step Guide To Learning The Linux Operating System And Command Line Easy & Fast!
    2016
    How Operating Systems Work How Operating Systems Work
    2015
    Computer Terminology Glossary Computer Terminology Glossary
    2011
    The VDI Delusion The VDI Delusion
    2012
    CompTIA A+ Certification All-in-One For Dummies CompTIA A+ Certification All-in-One For Dummies
    2019
    Linux Linux
    2020
    Security Vs. Convenience Security Vs. Convenience
    2012
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Conflicts of Interest Conflicts of Interest
    2012
    The Unquenchable Flame The Unquenchable Flame
    2010
    Delighting in the Trinity Delighting in the Trinity
    2012
    Enjoy Your Prayer Life Enjoy Your Prayer Life
    2014
    Administration: Configuration and Security Administration: Configuration and Security
    2013
    Hacked?! Hacked?!
    2015
    Information Security Management - ITP 370 Information Security Management - ITP 370
    2014
    The State of Risk-Based Security Management The State of Risk-Based Security Management
    2012
    Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
    2011
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012