Computer Security Fundamentals

الغلاف الأمامي
Pearson IT Certification, 01‏/06‏/2016 - 448 من الصفحات

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY


Clearly explains core concepts, terminology, challenges, technologies, and skills


Covers today’s latest attacks and countermeasures


The perfect beginner’s guide for anyone interested in a computer security career


Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.


Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.


Learn how to

· Identify and prioritize potential threats to your network

· Use basic networking knowledge to improve security

· Get inside the minds of hackers, so you can deter their attacks

· Implement a proven layered approach to network security

· Resist modern social engineering attacks

· Defend against today’s most common Denial of Service (DoS) attacks

· Halt viruses, spyware, worms, Trojans, and other malware

· Prevent problems arising from malfeasance or ignorance

· Choose the best encryption methods for your organization

· Compare security technologies, including the latest security appliances

· Implement security policies that will work in your environment

· Scan your network for vulnerabilities

· Evaluate potential security consultants

· Master basic computer forensics and know what to do if you’re attacked

· Learn how cyberterrorism and information warfare are evolving

 

الصفحات المحددة

المحتوى

Introduction
Introduction to Computer Security
Networks and the Internet
SANS Institute
Networks and the Internet
How the Internet Works
Advanced Network Communications Topics
Cyber Stalking Fraud and Abuse
Test Your Skills
Computer Security Technology
Firewalls
Computer Security Software
Encryption
WiFi Security
Security Policies
Data Classification

Investment Offers
Cyber Stalking
Denial of Service Attacks
Summary
How a Virus Spreads
Malware
Techniques Used by Hackers
Actual Attacks
Malware Creation
Industrial Espionage in Cyberspace
Encryption
Cryptography Basics
Public Key Asymmetric Encryption
Steganography
Security Policies
Network Scanning and Vulnerability Scanning
Cyber Terrorism and Information Warfare
Actual Cases
Test Your Skills
Cyber Detective
Introduction to Forensics
Finding Evidence on the
Cell Phone Concepts
A Glossary
B Resources
Answers to the Multiple Choice Questions
Index

عبارات ومصطلحات مألوفة

نبذة عن المؤلف (2016)

Chuck Easttom is a computer security and forensics expert. He has authored 20 books, including several on computer security, forensics, and cryptography. He holds 6 patents and 40 computer certifications, including many security and forensics certifications. He has conducted training for law enforcement, federal agencies, and friendly foreign governments. He frequently works as an expert witness in computer-related cases. He is also a frequent speaker on computer security topics at a variety of security-related conferences. You can visit his website at www.chuckeasttom.com.

معلومات المراجع