Introduction to Internet Security: From Basics to Beyond

Product Description
Providing the means for plugging into the Internet and determining the level of security appropriate for any small business, a guide to the basic hazards lurking online also contains a complete listing of resources for additional security information. Original. (Beginner)…. More >>

Introduction to Internet Security: From Basics to Beyond

5 replies
  1. Della Sanchez says:

    It covers security technology and privacy law, also how consumers can use free security software to protect their business secrets.

    The book discussed warnings by cyber rights advocates about the threat of Big Brother government and corporations.
    Rating: 4 / 5

  2. Della Sanchez says:

    This book is easy to read, filled with interesting background, and filled with helpful diagrams.

    I read it two times. The first to get a grasp of the rather complex technologies. The second, to get an appreciation for the culture surrounding hackers, viruses, and the industry that seeks to stop them.

    It helped me get a promotion, and I’m not computer literate. Two thumbs up!

    Della Sanchez
    Rating: 5 / 5

  3. George Burton says:

    Excellent Primer on Encryption, also digital signatures.

    Easy to read, with lots of charts and illustrations.

    The information on PGP was particularly helpfull.
    Rating: 5 / 5

  4. Anonymous says:

    You must be prepared to be disillusioned, because the incredible number of threats identified in this book are vast; from viruses, to hackers to Big Brother, etc.

    What the book does well, is provide the basic definitions of the technologies employed to both violate us and protect us. It was entertaining, considering the subject matter affects all of our online privacy and security.

    I rate it highly for my students.

    Olive Dean Teacher, Atlanta
    Rating: 5 / 5

  5. Anonymous says:

    Interesting Discussion on Privacy and Security

    I liked the following: the book raises points of great interest to business, since secrets could not be protected if corrupt companies and governments captured them, and sold them to the highest bidder.

    The book also provides information about employee rights with respect to e-mail on the job. It also talked about how a software company was penalized when they damaged an installation that was late on its bill.

    The book also gives a short history of PGP, the encyrption program that helped educate everybody.

    Good book for those who want a nice overview of electronic security threats and security technology.

    It is very easy to read, written by somebody who seems to have a great deal of experience and understanding of the big picture. It reminded me of a book entitled, “Information Warfare” (can’t remember author).
    Rating: 4 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.