ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY


Clearly explains core concepts, terminology, challenges, technologies, and skills

Buy Now From Amazon

Product Review

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY


Clearly explains core concepts, terminology, challenges, technologies, and skills


Covers today’s latest attacks and countermeasures


The perfect beginner’s guide for anyone interested in a computer security career


Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.


Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.


Learn how to

·         Identify and prioritize potential threats to your network

·         Use basic networking knowledge to improve security

·         Get inside the minds of hackers, so you can deter their attacks

·         Implement a proven layered approach to network security

·         Resist modern social engineering attacks

·         Defend against today’s most common Denial of Service (DoS) attacks

·         Halt viruses, spyware, worms, Trojans, and other malware

·         Prevent problems arising from malfeasance or ignorance

·         Choose the best encryption methods for your organization

·         Compare security technologies, including the latest security appliances

·         Implement security policies that will work in your environment

·         Scan your network for vulnerabilities

·         Evaluate potential security consultants

·         Master basic computer forensics and know what to do if you’re attacked

·         Learn how cyberterrorism and information warfare are evolving

 



Similar Products

Security Awareness: Applying Practical Security in Your WorldSurvey of Operating Systems, 5eSpies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every DayThe Art of Deception: Controlling the Human Element of SecurityBusiness Intelligence, Analytics, and Data Science: A Managerial Perspective (4th Edition)Web Development and Design Foundations with HTML5 (8th Edition)Starting Out with Java: From Control Structures through Data Structures (3rd Edition)New Perspectives on Blended HTML and CSS Fundamentals: IntroductoryThe Architecture of Computer Hardware, Systems Software, and Networking: An Information Technology ApproachStarting Out with Programming Logic and Design (4th Edition)