did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780133027419

Next Series Introduction to Computer Security

by
  • ISBN13:

    9780133027419

  • ISBN10:

    0133027414

  • Edition: 1st
  • Format: Spiral Bound
  • Copyright: 2012-10-08
  • Publisher: Prentice Hall
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $102.00

Summary

The NEXT Series provides innovative instructors with a high-quality, academic teaching solution that focuses on the next great technologies and innovations.

Table of Contents

Chapter One Introduction to Information Security 1 Objective 1 Define the Fundamentals of Information Security 1 Objective 2 Identify Various Types of Malware 5 Objective 3 Describe Measures to Improve Physical Security 8 Objective 4 Explain Social Engineering Attacks 10

 

 

Chapter Two Computer Security 17 Objective 1 Define the Importance of Windows Update 18 Hands-On Exercise 1 Review Configuration Settings Using Windows Update 18 Objective 2 Configure an Antivirus Program 22 Hands-On Exercise 2 Update and Scan Using Windows Defender Spyware 23 Hands-On Exercise 3 Install AVG Anti-Virus 2012 27 Objective 3 Identify Various Services Running on a Computer 29 Hands-On Exercise 4 Review and Configure Services Running 29 Objective 4 Explain Backup Methods 32 Hands-On Exercise 5 Set Up Windows Backup and Back Up Your System 33 Hands-On Exercise 6 Review System Restore 37 Objective 5 Configure a Pop-up Blocker 39 Hands-On Exercise 7 Review Pop-up Blocker Settings in Internet Explorer 40 Hands-On Exercise 8 Review Pop-up Blocker Settings in Google Chrome 42 Objective 6 Create Recovery Discs 43 Hands-On Exercise 9 Create Recovery Discs 44

 

 

Chapter Three Home Networking 51 Objective 1 Configure Security on a Wireless Router 52 Hands-On Exercise 1 Configure Security on a Wireless Router 54 Objective 2 Differentiate Wireless Security Algorithms 62 Hands-On Exercise 2 Configure Wireless Security Algorithms 63 Objective 3 Manage Configuration and Services Running on a Wireless Router 65 Hands-On Exercise 3 Maintenance on a Wireless Router 65

 

 

Chapter Four Application Security 77 Objective 1 Define Strong Passwords 78 Hands-On Exercise 1 Test Your Password 79 Objective 2 Configure Web Browser Security 80 Hands-On Exercise 2 View and Modify Security Zones 81 Hands-On Exercise 3 View and Configure Cookies 86 Hands-On Exercise 4 View and Configure Parental Controls 89 Hands-On Exercise 5 View and Configure Content Advisor 93 Hands-On Exercise 6 Configure and Perform Web Browser Maintenance 95 Objective 3 Identify Secure Protocols 97

 

 

Chapter Five Networking Basics 105 Objective 1 Explain TCP/IP Addressing 106 Hands-On Exercise 1 Decimal to Binary Conversion 107 Hands-On Exercise 2 Binary to Decimal Conversion 110 Hands-On Exercise 3 Calculate Network and Host Addresses 115 Objective 2 Describe TCP/IP Common Protocols 117 Objective 3 Utilize TCP/IP Commands and Utilities 118 Hands-On Exercise 4 Use Ipconfig Command 119 Hands-On Exercise 5 Use ARP Command 121 Hands-On Exercise 6 Use Netstat Command 124 Hands-On Exercise 7 Use Ping Command 125 Hands-On Exercise 8 Use Tracert Command 127 Hands-On Exercise 9 Use Commands and Utilities 128

 

 

Chapter Six Advanced Security 133 Objective 1 Configure the HOSTS File 134 Hands-On Exercise 1 Configure the HOSTS File 135 Hands-On Exercise 2 Download and Install MVPS HOSTS File 137 Objective 2 Explain a DMZ 140 Objective 3 Explain Intrusion Detection Systems 142 Objective 4 Describe Cryptography Methodologies 144 Hands-On Exercise 3 Encode and Decode Using ROT-13 145 Hands-On Exercise 4 Encode and Decode Using the Vigenere Cipher 147 Hands-On Exercise 5 Creating Public and Mutual Keys Using Diffie-Hellman 149 Glossary 155 Index 157

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program