ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you ...
Read More
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets-and expand your career options. Learn how to ??? Identify and prioritize potential threats to your network ??? Use basic networking knowledge to improve security ??? Get inside the minds of hackers, so you can deter their attacks ??? Implement a proven layered approach to network security ??? Resist modern social engineering attacks ??? Defend against today's most common Denial of Service (DoS) attacks ??? Halt viruses, spyware, worms, Trojans, and other malware ??? Prevent problems arising from malfeasance or ignorance ??? Choose the best encryption methods for your organization ??? Compare security technologies, including the latest security appliances ??? Implement security policies that will work in your environment ??? Scan your network for vulnerabilities ??? Evaluate potential security consultants ??? Master basic computer forensics and know what to do if you're attacked ??? Learn how cyberterrorism and information warfare are evolving
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Pages and cover are intact. Used book in good and clean conditions. Limited notes marks and highlighting may be present. May show signs of normal shelf wear and bends on edges. Item may be missing CDs or access codes. May include library marks.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fair. The item is very worn but continues to work perfectly. Signs of wear can include aesthetic issues such as scratches, dents, worn and creased covers, folded page corners and minor liquid stains. All pages and the cover are intact, but the dust cover may be missing. Pages may include moderate to heavy amount of notes and highlighting, but the text is not obscured or unreadable. Page edges may have foxing (age related spots and browning). May NOT include discs, access code or other supplemental materials.