Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you've learned. Whether you're a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options. Learn how to Identify the worst threats to your network and assess your risks Get inside the minds of hackers, so you can prevent their attacks Implement a proven layered approach to network security Use basic networking knowledge to improve security Resist the full spectrum of Internet-based scams and frauds Defend against today's most common Denial of Service (DoS) attacks Prevent attacks by viruses, spyware, and other malware Protect against low-tech social engineering attacks Choose the best encryption methods for your organization Select firewalls and other security technologies Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Understand cyberterrorism and information warfare Master basic computer forensics and know what to do after you're attacked
Computer Security Fundamentals
Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you've learned. Whether you're a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options. Learn how to Identify the worst threats to your network and assess your risks Get inside the minds of hackers, so you can prevent their attacks Implement a proven layered approach to network security Use basic networking knowledge to improve security Resist the full spectrum of Internet-based scams and frauds Defend against today's most common Denial of Service (DoS) attacks Prevent attacks by viruses, spyware, and other malware Protect against low-tech social engineering attacks Choose the best encryption methods for your organization Select firewalls and other security technologies Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Understand cyberterrorism and information warfare Master basic computer forensics and know what to do after you're attacked
Compare
Mark –
I use my goodreads for myself and not as a social media item. Although I'm still reading this book, I wanted to count it finished to clear it off my "Now Reading" section. I do not want to include textbooks for school classes in my good reads. However, I will be taking a test for a security certification at the end of january/ early february. From this book, I will be memorizing the chapter questions. I have learned a little about security from this text, but I feel actually studying for the cert I use my goodreads for myself and not as a social media item. Although I'm still reading this book, I wanted to count it finished to clear it off my "Now Reading" section. I do not want to include textbooks for school classes in my good reads. However, I will be taking a test for a security certification at the end of january/ early february. From this book, I will be memorizing the chapter questions. I have learned a little about security from this text, but I feel actually studying for the certification will teach me more than what I am covering in class. As to the actual content of the textbook, it's fine. It's what it sounds like. I will say that this is the first textbook I've ever read where the author seems snarky.
Subhajit Das –
Lori Garcia –
Matt –
Sharon –
Sung-Jae Lee –
Dianne –
Claudio –
Jerald Jackson –
Matthew Connell –
Eric –
Ezekiel Jere –
Patrick –
David Pilgrim –
Danielle –
Simon –
Nick –
Jonathan Swindell –
Seth Townsend –
Shaun –
Rob Lewis –
David –
Chris Counts –
Bjørn Olav Listog –
Erin –
Nighama –
Aohori –
Jay Moretz –
Elliot –
James Paul –
Esteban Guerrero –
Shelaniece Clash –
Bartu Nayci –
Khalidian G fiqri –
Azzaz –
akmurat –
Gary Asson –