Applied Information Security A Hands-On Guide to Information Security Software

by ;
  • ISBN13:


  • ISBN10:


  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2013-11-13
  • Publisher: Pearson

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $4.20
    Check/Direct Deposit: $4.00
List Price: $89.60 Save up to $68.01
  • Rent Book $44.80
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. This book can  be used in executive training programs, or by anyone interested in learning the practical side of IT security.

Table of Contents

1. DOS Commands
2. Windows Security    ‘
3. Web Security    
4. Porn & Spam Filters    
5. Monitoring Software    
6. Password Auditors    
7. Wireless    
8. Security Readings    
9. Information Gathering    
10. Packet Sniffer    
11. Port & Vulnerability Scanners    
12. Honeypots and IDS    
13. File Integrity Checkers & System Monitors    
14. Alternate Data Streams    
15. Data Recovery & Secure Deletion    
16. Cryptography    
17. Steganography    
18. Forensics    
19. Application Security    
20. Linux Primer    
21. Securing Web Servers    
22. Utilities & Other    
23. IT Security Distributions
24. Mobile Security
Appendix A. Antivirus
Appendix B. Software Links    

Rewards Program

Write a Review