did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780135774779

Computer Security Fundamentals

by
  • ISBN13:

    9780135774779

  • ISBN10:

    0135774772

  • Edition: 4th
  • Format: Paperback
  • Copyright: 2019-10-22
  • Publisher: Pearson IT Certification
  • View Upgraded Edition
This product is included in:
Learn More

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $80.00 Save up to $53.26
  • Rent Book $26.74
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE

    7-Day eTextbook Access 7-Day eTextbook Access

    IN STOCK USUALLY SHIPS WITHIN 24-48 HOURS.
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Clearly explains core concepts, terminology, challenges, technologies, and skills


Covers today’s latest attacks and countermeasures


The perfect beginner’s guide for anyone interested in a computer security career


Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.


Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.


Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.


LEARN HOW TO


  • Identify and prioritize potential threats to your network
  • Use basic networking knowledge to improve security
  • Get inside the minds of hackers, so you can deter their attacks
  • Implement a proven layered approach to network security
  • Resist modern social engineering attacks
  • Defend against today’s most common Denial of Service (DoS) attacks
  • Halt viruses, spyware, worms, Trojans, and other malware
  • Prevent problems arising from malfeasance or ignorance
  • Choose the best encryption methods for your organization
  • Compare security technologies, including the latest security appliances
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Master basic computer forensics and know what to do if you’re attacked
  • Learn how cyberterrorism and information warfare are evolving

Author Biography

Chuck Easttom (Plano, TX) is a computer security and forensics expert. He has written 20 books, including several on computer security, forensics, and cryptography. He holds 6 patents and 40 computer certifications, including many security and forensics certifications. He has conducted training for law enforcement, federal agencies, and friendly foreign governments. He frequently works as an expert witness in computer-related cases. He is also a frequent speaker on computer security topics at a variety of security-related conferences. You can visit his website at www.chuckeasttom.com.

Table of Contents

Introduction

Chapter 1: Introduction to Computer Security

Chapter 2: Networks and the Internet

Chapter 3: Cyber Stalking, Fraud, and Abuse

Chapter 4: Denial of Service Attacks

Chapter 5: Malware

Chapter 6: Techniques Used by Hackers

Chapter 7: Industrial Espionage in Cyberspace

Chapter 8: Encryption

Chapter 9: Computer Security Technology

Chapter 10: Security Policies

Chapter 11: Network Scanning and Vulnerability Scanning

Chapter 12: Cyber Terrorism and Information Warfare

Chapter 13: Cyber Detective

Chapter 14: Introduction to Forensics


Appendix A: Glossary

Appendix B: Resources

Appendix C: Answers to the Multiple Choice Questions

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program