Computer Security Fundamentals, 3rd Edition

Book Description

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today’s latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a computer security career

Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, , spyware, defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, , and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

Learn how to

  • Identify and prioritize potential threats to your network
  • Use basic networking knowledge to improve security
  • Get inside the minds of hackers, so you can deter their attacks
  • Implement a proven layered approach to network security
  • Resist modern social engineering attacks
  • Defend against today’s most common Denial of (DoS) attacks
  • Halt viruses, spyware, worms, Trojans, and other malware
  • Prevent problems arising from malfeasance or ignorance
  • Choose the best encryption methods for your organization
  • Compare security technologies, including the latest security appliances
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Master basic computer forensics and know what to do if you’re attacked
  • Learn how cyberterrorism and warfare are evolving

Table of Contents

Chapter 1: Introduction to Computer Security
Chapter 2: Networks and the Internet
Chapter 3: Cyber Stalking, Fraud, and Abuse
Chapter 4: Denial of Service Attacks
Chapter 5: Malware
Chapter 6: Techniques Used by Hackers
Chapter 7: Industrial Espionage in Cyberspace
Chapter 8: Encryption
Chapter 9: Computer Security Technology
Chapter 10: Security Policies
Chapter 11: Network Scanning and Scanning
Chapter 12: Cyber Terrorism and Information Warfare
Chapter 13: Cyber Detective
Chapter 14: Introduction to Forensics
Appendix A: Glossary
Appendix B: Resources
Appendix C: Answers to the Multiple Choice Questions

Book Details

Download LinkFormatSize (MB)Upload Date
Download from UpLoadedTrue PDF, EPUB18.101/05/2017
Download from ZippyShareTrue PDF, EPUB18.110/25/2016
How to Download? Report Dead Links & Get a Copy