Internet Safety: Keeping your Computer Safe on the Internet
by Leo Notenboom
Publisher: Puget Sound Software 2011
Number of pages: 114
In this free 113 page e-book I summarize popular articles from Ask Leo! covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
Download or read it online for free here:
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.