publication . Part of book or chapter of book . Thesis . 2009

Security by Design

Tanner, M. James;
Open Access
  • Published: 10 Aug 2009
  • Publisher: Apress
  • Country: United States
Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not used to be such a prominent issue because computers were not connected 24/7, they used dialup and did not experience the effects from connecting to multiple computers. Today ...
free text keywords: Linux security layers, Information Security, Linux System administrators, T1
Related Organizations
Download fromView all 2 versions
Thesis . 2009
Provider: VTechWorks
Part of book or chapter of book . 2014
Provider: Crossref
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue