Computer Security Fundamentals

الغلاف الأمامي
Pearson IT Certification, 23‏/05‏/2016 - 448 من الصفحات
0 مراجعات
لا تتحقّق Google من المراجعات، ولكنها تتحقّق من المحتوى المزيّف وتزيله في حال رصده.

Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying.

Computer Security Fundamentals, Third Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you’ve learned. Whether you’re a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options.

Learn how to

  • Identify the worst threats to your network and assess your risks
  • Get inside the minds of hackers, so you can prevent their attacks
  • Implement a proven layered approach to network security
  • Use basic networking knowledge to improve security
  • Resist the full spectrum of Internet-based scams and frauds
  • Defend against today’s most common Denial of Service (DoS) attacks
  • Prevent attacks by viruses, spyware, and other malware
  • Protect against low-tech social engineering attacks
  • Choose the best encryption methods for your organization
  • Select firewalls and other security technologies
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Understand cyberterrorism and information warfare
  • Master basic computer forensics and know what to do after you’re attacked
 

ما يقوله الناس - كتابة مراجعة

لم نعثر على أي مراجعات في الأماكن المعتادة.

الصفحات المحددة

المحتوى

Introduction
Introduction to Computer Security 2 Networks and the Internet 3 Cyber Stalking Fraud and Abuse 4 Denial of Service Attacks
Networks and the Internet
How the Internet Works
IPConfig
Test Your Skills
Test Your Skills
Malware
MAC and HMAC
Cryptography Used on the Internet
Computer Security Technology
Firewalls
Computer Security Software
Digital Certificates
Virtual Private Networks
Summary

Denial of Service Attacks
Malware
Test Your Skills
Techniques Used by Hackers
Actual Attacks
Malware Creation
Summary
Industrial Espionage in Cyberspace
Encryption
Encryption
Modern Methods
Public Key Asymmetric Encryption
Security Policies
Disaster Recovery Plan
Network Scanning and Vulnerability Scanning
Cyber Terrorism and Information Warfare
Cyber Detective
Test Your Skills
Introduction to Forensics
Finding Evidence on the
A Glossary
B Resources
Index

عبارات ومصطلحات مألوفة

معلومات المراجع