TY - BOOK AU - Tolboom,Ryan ED - Open Textbook Library TI - Computer Systems Security: Planning for Success T2 - Open textbook library AV - QA76 CY - Minneapolis, MN PB - Open Textbook Library KW - Computer Science KW - Textbooks KW - Information technology KW - Cryptography N1 - Legal -- Acknowledgements -- Instructional Notes -- 1. Introduction -- 2. Cryptography -- 3. Malware -- 4. Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. Incident Response and Continuity -- 10. Virtualization N2 - The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures UR - https://open.umn.edu/opentextbooks/textbooks/1355 ER -