Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Computer Security: 20 Things Every Employee Should Know (McGraw-Hill Professional Education) 2nd Edition

4.4 out of 5 stars 21 customer reviews
ISBN-13: 978-0072262827
ISBN-10: 0072262826
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$2.90 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$12.90 On clicking this link, a new layer will be open
More Buying Choices
19 New from $7.25 16 Used from $2.90
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Windows10ForDummiesVideo
Windows 10 For Dummies Video Training
Get up to speed with Windows 10 with this video training course from For Dummies. Learn more.
$12.90 FREE Shipping on orders with at least $25 of books. Usually ships within 1 to 3 weeks. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Computer Security: 20 Things Every Employee Should Know (McGraw-Hill Professional Education)
  • +
  • The Executive Guide to Information Security: Threats, Challenges, and Solutions
Total price: $50.37
Buy the selected items together

Editorial Reviews

From the Back Cover

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

About the Author

Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.
NO_CONTENT_IN_FEATURE

New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Series: McGraw-Hill Professional Education
  • Spiral-bound: 64 pages
  • Publisher: McGraw-Hill Education; 2 edition (September 8, 2005)
  • Language: English
  • ISBN-10: 0072262826
  • ISBN-13: 978-0072262827
  • Product Dimensions: 6 x 0.3 x 9 inches
  • Shipping Weight: 4 ounces (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (21 customer reviews)
  • Amazon Best Sellers Rank: #2,220,208 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

Format: Paperback
Perhaps the greatest vulnerability to our information is lack of awareness. This book is the perfect way to spread the word to help prevent security breaches. The title says it all - everyone from executive managers to human resources to end users can benefit from it. I'm a true believer that people benefit the most from practical advice presented in a non-technical fashion. This book executes that flawlessly.
1 Comment 91 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Consultant Ben Rothke's "Computer Security: 20 Things Every Employee Should Know," is a forty-five page handbook for securing the workplace from McGraw-Hill's Professional Education series. Rothke has written an up-to-date, clear, and concise introduction to the many dangers that lurk in cyberspace. He covers such topics as phishing, spyware, identity theft, e-mail hoaxes, data management, firewalls, and choosing a secure password.

"Computer Security" would be most useful as a handout for new hires who work in a corporate setting. Rothke warns workers to use discretion when surfing the Web, and to avoid downloading anything unless they are sure that it safe. Employers do not look too kindly on employees who use their databases carelessly and frivolously. Attention to confidentiality, assiduously backing up important data, and the ability to avoid introducing viruses or other invaders into the company computer system are essential priorities for every staff member.

This handbook is nicely laid out, easy to read, and relatively jargon free. At the end of the book is a handy glossary of computer security terms. Bulleted lists and summaries reinforce the important points that the reader should remember. This is an excellent introduction to a subject that is vital for anyone who works with computers in a business setting or even at home. A moment of cyber-carelessness can have serious consequences, and preventing trouble is a great deal easier than having to fix it after the fact.
1 Comment 57 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Spiral-bound
Network security is only as strong as its weakest link. Having top of the line firewalls, intrusion detection, antivirus and other security tools deployed will do little good if a user unwittingly gives his username and password to a malicious attacker. The sad fact is that the users, the employees who use the network, are the weak link in the security chain.

The other issue is that many employees don't truly care about company assets, or at least not enough to embark on a journey to learn about how to better secure them. But, most people have computers at home tha they use personally and have kids that use them. That means that they have a vested interest in learning computer and network security, even if it isn't because they want to safeguard the company network.

Rothke's book provides brief, but clear, explanations of 20 of the most important things that users should know in order to use their computer, e-mail, and the Internet without becoming a victim. Some of the information, such as Use Firewalls and Patches, is really outside the scope of what an employee should know. But, they can apply the information at home and it provides a better understanding of why they need those things at work as well.
1 Comment 53 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Spiral-bound
Having served as the person in our firm with the most paranoia about computer security, I have been constantly struck by how careless people can be in this area. It's as though computer security can be assumed to be in place . . . rather than being something that needs to be encouraged, nurtured and observed.

While I often read technical manuals on computer security to catch up with the latest, none of those manuals could hope to attract a full reading by anyone who has ever worked for me.

I was delighted to find that the Second Edition of Computer Security: 20 Things Every Employee Should Know has everything in it that I hope all my employees will remember to do.

The book is brief, it's accurate and it's easy to understand.

If you follow Mr. Rothke's advice, most major problems will be avoided.

The book opens by explaining about phishing and spyware by explaining what they are and why an employee should want to avoid them. Here's the advice:

1. Don't reply or click on links asking for personal or financial information.

2. Don't download programs from companies you don't know.

3. Keep your computer secure with pop-up blockers, a fire wall, and anti-virus and anti-spyware software.

I particularly liked the non-technical advice such as the one on avoiding identity theft.

The book also has little case studies of what can go wrong. One of my favorites was an employee who wanted to go home and let a new employee use his security access card so she could keep working.

Where there is a technical element, Mr. Rothke keeps that simple.
Read more ›
Comment 48 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic.
It is an excellent source to reference so as to provide a security awareness training indeed. It is because we should keep something simple. Even we could sella company to purchase this book for their employees. Light-weight and simple but not simplistic handbook is useful for people to understand their positions and roles as well as relevant response and action. in security-related issues.
Comment 51 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews