Chapter 1
Basics of Cybersecurity
Cybersecurity
The earliest computers, such as the ZX-Spectrum or the original Apple computer designed by Steve Jobs and his colleagues, didn’t require login information or user credentials. Anyone could just switch on the machine, open a word processing application, type, and print. Most of those standalone machines did not even connect to a network. At that time, the only thing people wanted was a machine that could print a document and play a few funny games.
The languages used were simple, too—BASIC, C, and so on. Some systems used mostly by government organizations had huge machines called mainframes that ran languages such as FORTRAN and COBOL. A few database programs, such as DBase III and DBase IV, existed. ...
Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.