Computer Security Fundamentals ( Pearson It Cybersecurity Curriculum (Itcc) ) (3RD ed.)

$61.46

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
  • By Easttom, William Chuck
  • 3rd Edition | 2016 | Paperback

Free Shipping

SKU: 9780789757463eR2s4a2 Category: Tag:

Used Book in Good Condition: Ships in one business day! Used books may have highlighting and/or writing. May not include supplements or access codes. Ships with tracking.

Contributor(s): Easttom, William (Chuck) (Author)

ISBN: 078975746X    EAN: 9780789757463

Publisher: Pearson It Certification

Pub Date: June 23, 2016

Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets–and expand your career options.

Learn how to

– Identify and prioritize potential threats to your network

– Use basic networking knowledge to improve security

– Get inside the minds of hackers, so you can deter their attacks

– Implement a proven layered approach to network security

– Resist modern social engineering attacks

– Defend against today’s most common Denial of Service (DoS) attacks

– Halt viruses, spyware, worms, Trojans, and other malware

– Prevent problems arising from malfeasance or ignorance

– Choose the best encryption methods for your organization

– Compare security technologies, including the latest security appliances

– Implement security policies that will work in your environment

– Scan your network for vulnerabilities

– Evaluate potential security consultants

– Master basic computer forensics and know what to do if you’re attacked

– Learn how cyberterrorism and information warfare are evolving

 

Shopping Cart