CART

(0) items

Security Awareness : Applying Practical Security in Your World,9781418809690

Security Awareness : Applying Practical Security in Your World

by
Edition:
2nd
ISBN13:

9781418809690

ISBN10:
1418809691
Format:
Paperback
Pub. Date:
2/7/2006
Publisher(s):
Cengage Learning Ptr
List Price: $74.95

Rent Book

(Recommended)
 
Term
Due
Price
$4.99

Hurry!

Only three copies
in stock at this price.

Buy Used Book

In Stock Usually Ships in 24 Hours.
$1.00

eBook

We're Sorry
Not Available

New Book

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $0.01

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 2nd edition with a publication date of 2/7/2006.
What is included with this book?
  • The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Related Products


  • Security Awareness : Applying Pracitical Security in Your World
    Security Awareness : Applying Pracitical Security in Your World
  • Security Awareness : Applying Practical Security in Your World
    Security Awareness : Applying Practical Security in Your World
  • Security Awareness : Applying Practical Security in Your World
    Security Awareness : Applying Practical Security in Your World
  • Security Awareness: Applying Practical Security in Your World, 3rd Edition
    Security Awareness: Applying Practical Security in Your World, 3rd Edition




Summary

Building on the success of the first edition, this new text provides a non-technical approach to practical computer security for all users, from business professionals to students to home users. Suitable for any introductory security course, this book makes a great bundle for those wishing to add security coverage to their course. This practical, hands-on book includes chapter openers with real-world situations to help give meaningful context to the chapter concepts. Then, each chapter closes with hands-on projects to help students apply their knowledge through critical thinking. In addition to basic security concepts, readers will gain practical skills on how to protect and harden their computers and networks from increasingly sophisticated attacks.

Author Biography

Mark Ciampa is an Assistant Professor in Computer Information Systems at Western Kentucky University.

Table of Contents

Introduction ix
Introduction to Security
1(42)
Challenges of Securing Information
2(6)
Today's Security Attacks
2(3)
Difficulties in Defending Against Attackers
5(3)
What is Information Security?
8(8)
Defining Information Security
8(2)
Information Security Terminology
10(1)
Understanding the Importance of Information Security
11(5)
Who Are the Attackers?
16(3)
Hackers
16(1)
Crackers
17(1)
Script Kiddies
17(1)
Spies
17(1)
Thieves
17(1)
Employees
18(1)
Cyberterrorists
18(1)
Defending Against Attacks
19(2)
Layering
19(1)
Limiting
19(1)
Diversity
20(1)
Obscurity
20(1)
Simplicity
21(1)
Building a Comprehensive Security Strategy
21(2)
Block Attacks
21(1)
Update Defenses
22(1)
Minimize Losses
23(1)
Send Secure Information
23(1)
Chapter Summary
23(1)
Key Terms
24(2)
Review Questions
26(1)
Hands-On Projects
27(13)
Case Projects
40(3)
Desktop Security
43(46)
Attacks on Desktop Computers
44(9)
Malicious Software
44(3)
Basic Attacks
47(6)
Desktop Defenses
53(13)
Patch Software
53(3)
Antivirus Software
56(1)
Strong Authentication Methods
57(3)
Protecting Laptop Computers
60(1)
Cryptography
61(3)
Properly Retiring Old Computers
64(2)
Recovering from Attacks
66(4)
Preparing For an Attack
66(2)
Restoring the Computer
68(2)
Chapter Summary
70(1)
Key Terms
71(2)
Review Questions
73(1)
Hands-On Projects
74(13)
Case Projects
87(2)
Internet Security
89(40)
How the Internet Works
90(4)
The World Wide Web
90(2)
E-Mail
92(2)
Internet Attacks
94(12)
Web Attacks
95(7)
E-mail Attacks
102(4)
Web Defenses through Browser Settings
106(7)
Advanced Security Settings
106(5)
Security Zones
111(1)
Restricting Cookies
112(1)
E-Mail Defenses
113(3)
Technology-Based Defenses
113(3)
Procedures
116(1)
Chapter Summary
116(1)
Key Terms
117(2)
Review Questions
119(1)
Hands-On Projects
120(6)
Case Projects
126(3)
Personal Security
129(36)
What is Spyware?
130(4)
Spyware Tools
134(8)
Adware
134(1)
Phishing
135(3)
Keyloggers
138(2)
Configuration Changers
140(1)
Dialers
140(1)
Backdoors
141(1)
Personal Security Defenses
142(10)
Antispyware Software
142(4)
Recognize Phishing
146(3)
Legislation and Procedures
149(3)
Chapter Summary
152(1)
Key Terms
153(1)
Review Questions
154(1)
Hands-On Projects
155(7)
Case Projects
162(3)
Network Security
165(42)
How Networks Work
166(7)
Types of Networks
166(3)
Transmitting Network Data
169(1)
Network Devices
170(3)
Attacks on Networks
173(7)
Denial of Service (DoS) Attacks
173(2)
Zombie and Botnets
175(1)
Man-in-the-Middle Attacks
176(1)
Hijacking and Spoofing
176(2)
Sniffing
178(2)
Network Defenses
180(11)
Network Devices
181(5)
Network Design
186(4)
Testing Network Security
190(1)
Wireless LAN Security
191(4)
Chapter Summary
195(1)
Key Terms
196(1)
Review Questions
197(2)
Hands-On Projects
199(6)
Case Projects
205(2)
Enterprise Security
207(32)
Physical Security
208(6)
Enterprise Policies
214(4)
Security Policy
214(1)
Acceptable Use Policy (AUP)
215(2)
Privacy Policy
217(1)
Enterprise Plans
218(7)
Business Continuity Plan
218(4)
Disaster Recovery Plan
222(3)
Education and Training
225(3)
How Learners Learn
225(2)
Learning Resources
227(1)
Ethics
228(2)
Chapter Summary
230(1)
Key Terms
230(2)
Review Questions
232(2)
Hands-On Projects
234(3)
Case Projects
237(2)
Index 239


Please wait while the item is added to your cart...