ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today&;s latest attacks and countermeasures
The perfect beginner&;s guide for anyone interested in a computer security career
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.
Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.
Learn how to
·         Identify and prioritize potential threats to your network
·         Use basic networking knowledge to improve security
·         Get inside the minds of hackers, so you can deter their attacks
·         Implement a proven layered approach to network security
·         Resist modern social engineering attacks
·         Defend against today&;s most common Denial of Service (DoS) attacks
·         Halt viruses, spyware, worms, Trojans, and other malware
·         Prevent problems arising from malfeasance or ignorance
·         Choose the best encryption methods for your organization
·         Compare security technologies, including the latest security appliances
·         Implement security policies that will work in your environment
·         Scan your network for vulnerabilities
·         Evaluate potential security consultants
·         Master basic computer forensics and know what to do if you&;re attacked
·         Learn how cyberterrorism and information warfare are evolving
 
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Chuck Easttom is a computer security and forensics expert. He has authored 20 books, including several on computer security, forensics, and cryptography. He holds 6 patents and 40 computer certifications, including many security and forensics certifications. He has conducted training for law enforcement, federal agencies, and friendly foreign governments. He frequently works as an expert witness in computer-related cases. He is also a frequent speaker on computer security topics at a variety of security-related conferences. You can visit his website at www.chuckeasttom.com.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiEUR 3,69 per la spedizione in U.S.A.
Destinazione, tempi e costiDa: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00063072190
Quantità: 6 disponibili
Da: Giant Giant, Reston, VA, U.S.A.
paperback. Condizione: UsedAcceptable. Acceptable condition.May contain some marking/highlighting. Cover and pages show some wear/moisture damage. Not Satisfied? Contact us to get a refund. Codice articolo BRG-33_2_457
Quantità: 1 disponibili
Da: BookHolders, Towson, MD, U.S.A.
Condizione: Good. [ No Hassle 30 Day Returns ][ Ships Daily ] [ Underlining/Highlighting: NONE ] [ Writing: NONE ] [ Edition: third ] Publisher: Pearson IT Certification Pub Date: 6/23/2016 Binding: Paperback Pages: 448 third edition. Codice articolo 6879763
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Codice articolo G078975746XI3N00
Quantità: 1 disponibili
Da: ThriftBooks-Phoenix, Phoenix, AZ, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Codice articolo G078975746XI3N00
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Codice articolo G078975746XI4N00
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Fair. 3. The item might be beaten up but readable. May contain markings or highlighting, as well as stains, bent corners, or any other major defect, but the text is not obscured in any way. Workbook. Codice articolo 078975746X-7-18-42
Quantità: 1 disponibili
Da: A Team Books, Conway, AR, U.S.A.
paperback. Condizione: Good. Used books may not include access codes or one time use codes. Proven Seller with Excellent Customer Service. Choose expedited shipping and get it FAST. Codice articolo sun0000006959
Quantità: 1 disponibili
Da: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condizione: Good. 3rd Edition. Ships same day or next business day! UPS shipping available (Priority Mail for AK/HI/APO/PO Boxes). Used sticker and some writing and/or highlighting. Used books may not include working access code. Used books will not include dust jackets. Codice articolo 001850874U
Quantità: 1 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Very Good. ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers todays latest attacks and countermeasures The perfect beginners guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned. Whether youre a student, a professional, or a manager, this guide will help you protect your assetsand expand your career options. Learn how to Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against todays most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if youre attacked Learn how cyberterrorism and information warfare are evolving. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR010951283
Quantità: 1 disponibili