Applied Information Security A Hands-On Guide to Information Security Software

by ;
  • ISBN13:


  • ISBN10:


  • Edition: 2nd
  • Format: Paperback
  • Copyright: 11/13/2013
  • Publisher: Pearson

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $7.35
    Check/Direct Deposit: $7.00
  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
    Android 2.2 +
    Our reader is compatible
    Kindle Fire
    Our reader is compatible
    10 / 8 / 7 / Vista / XP
    Our reader is compatible
    Our reader is compatible
List Price: $88.60 Save up to $44.30
  • Rent Book $44.30
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. This book can  be used in executive training programs, or by anyone interested in learning the practical side of IT security.

Table of Contents

1. DOS Commands
2. Windows Security    ‘
3. Web Security    
4. Porn & Spam Filters    
5. Monitoring Software    
6. Password Auditors    
7. Wireless    
8. Security Readings    
9. Information Gathering    
10. Packet Sniffer    
11. Port & Vulnerability Scanners    
12. Honeypots and IDS    
13. File Integrity Checkers & System Monitors    
14. Alternate Data Streams    
15. Data Recovery & Secure Deletion    
16. Cryptography    
17. Steganography    
18. Forensics    
19. Application Security    
20. Linux Primer    
21. Securing Web Servers    
22. Utilities & Other    
23. IT Security Distributions
24. Mobile Security
Appendix A. Antivirus
Appendix B. Software Links    

Rewards Program

Write a Review