Chapter 3. Computer Systems Security Part II
This chapter covers the following subjects:
Implementing Security Applications: In this section, you learn how to select, install, and configure security applications such as personal firewalls, antivirus programs, and host-based intrusion detection systems. You’ll be able to distinguish between the various tools and decide which is best for the different situations you’ll see in the field.
Securing Computer Hardware and Peripherals: Here we delve into the physical: how to protect a computer’s hardware, ...