counter Computer Security Fundamentals - Free Download Books
Hot Best Seller

Computer Security Fundamentals

Availability: Ready to download

KEY BENEFIT This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas includi KEY BENEFIT This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software. For system analysts network administrators, network security professionals and security audit professionals.


Compare

KEY BENEFIT This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas includi KEY BENEFIT This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software. For system analysts network administrators, network security professionals and security audit professionals.

37 review for Computer Security Fundamentals

  1. 4 out of 5

    Rachel Bayles

    Very basic text for non-IT types to get an idea what goes on underneath the hood. At the very least, will frighten you into doing regular backups.

  2. 5 out of 5

    Wayne McCoy

    A solid introduction to computer security basics covering topics ranging from hackers and frauds to security policies and computer forensics. This book is by no means comprehensive, but provides lots of very useful information to anyone looking for a start in computer security. Each chapter ends with a series of self tests and exercises built to give the user further knowledge, and the book is full of links for further study and information. There are plenty of real world examples and best practi A solid introduction to computer security basics covering topics ranging from hackers and frauds to security policies and computer forensics. This book is by no means comprehensive, but provides lots of very useful information to anyone looking for a start in computer security. Each chapter ends with a series of self tests and exercises built to give the user further knowledge, and the book is full of links for further study and information. There are plenty of real world examples and best practices as well as baseline templates for security policies. A good start for anyone looking to begin learning about this field of study.

  3. 5 out of 5

    Katherine

  4. 5 out of 5

    Tornike

  5. 4 out of 5

    Greg

  6. 5 out of 5

    Dave

  7. 4 out of 5

    Subhajit Das

  8. 4 out of 5

    Lauren Anders

  9. 5 out of 5

    Ezekiel Jere

  10. 5 out of 5

    Faisal

  11. 4 out of 5

    Justin Scott

  12. 4 out of 5

    Heather

  13. 5 out of 5

    Kena

  14. 4 out of 5

    Ttp

  15. 5 out of 5

    Chieh-Wen Yang

  16. 4 out of 5

    Sean Barlow

  17. 4 out of 5

    Gabriel Gogirla

  18. 4 out of 5

    Franck

  19. 5 out of 5

    Anthony Rice

  20. 4 out of 5

    Danielle Thompson

  21. 4 out of 5

    As

  22. 4 out of 5

    Addidas Tommy

  23. 5 out of 5

    Ahmad Albab

  24. 4 out of 5

    Troyus23

  25. 5 out of 5

    Nighama

  26. 4 out of 5

    Vatterott College

  27. 4 out of 5

    BookDB

  28. 5 out of 5

    John

  29. 4 out of 5

    Ivan Zalukhu

  30. 4 out of 5

    Ladislav

  31. 4 out of 5

    Khalidian G fiqri

  32. 4 out of 5

    Swastik Bhat

  33. 4 out of 5

    Sravya

  34. 4 out of 5

    Azzaz

  35. 4 out of 5

    Nor Fauziah

  36. 4 out of 5

    Natheer Gharaibeh

  37. 4 out of 5

    Colpacchi

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.