Search Books
My Internet for Seniors My Samsung Galaxy S7

Computer Security Fundamentals (Pearson It Cybersecurity Curriculum (Itcc))

Author Easttom, William Chuck
Publisher Pearson IT Certification
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
80.00 USD
🛒 Buy New on Amazon 🇺🇸

✓ In Stock.

Share:
Book Details
ISBN / ASIN078975746X
ISBN-139780789757463
AvailabilityIn Stock.
Sales Rank312,537
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY


Clearly explains core concepts, terminology, challenges, technologies, and skills


Covers today s latest attacks and countermeasures


The perfect beginner s guide for anyone interested in a computer security career


Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you ve learned.


Whether you re a student, a professional, or a manager, this guide will help you protect your assets and expand your career options.


Learn how to

Identify and prioritize potential threats to your network

Use basic networking knowledge to improve security

Get inside the minds of hackers, so you can deter their attacks

Implement a proven layered approach to network security

Resist modern social engineering attacks

Defend against today s most common Denial of Service (DoS) attacks

Halt viruses, spyware, worms, Trojans, and other malware

Prevent problems arising from malfeasance or ignorance

Choose the best encryption methods for your organization

Compare security technologies, including the latest security appliances

Implement security policies that will work in your environment

Scan your network for vulnerabilities

Evaluate potential security consultants

Master basic computer forensics and know what to do if you re attacked

Learn how cyberterrorism and information warfare are evolving

Dynamic Models in Biology
View
Evolution and Standardization of Mobile Communications…
View
Mike Meyers' MCSE/MCSA Windows Server 2003 Active Dire…
View
Visual Basic 6 For Dummies
View
Logic at Botik '89: Symposium on Logical Foundations o…
View
Design Theory (Discrete Mathematics and Its Applicatio…
View
Photoshop Elements 10 Top 100 Simplified Tips and Tric…
View
Murach's ASP.NET 4.5 Web Programming with C# 2012
View