In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.
Learn how to:
In recent years, the need for education in computer security and related topics has grown dramatically âÂ and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.
Â Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers todayâs latest attacks and countermeasures
The perfect beginnerâs guide for anyone interested in a computer security career
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youâve learned.
Whether youâre a student, a professional, or a manager, this guide will help you protect your assetsâand expand your career options.
Learn how to
Â·Â Â Â Â Â Â Â Â Identify and prioritize potential threats to your network
Â·Â Â Â Â Â Â Â Â Use basic networking knowledge to improve security
Â·Â Â Â Â Â Â Â Â Get inside the minds of hackers, so you can deter their attacks
Â·Â Â Â Â Â Â Â Â Implement a proven layered approach to network security
Â·Â Â Â Â Â Â Â Â Resist modern social engineering attacks
Â·Â Â Â Â Â Â Â Â Defend against todayâs most common Denial of Service (DoS) attacks
Â·Â Â Â Â Â Â Â Â Halt viruses, spyware, worms, Trojans, and other malware
Â·Â Â Â Â Â Â Â Â Prevent problems arising from malfeasance or ignorance
Â·Â Â Â Â Â Â Â Â Choose the best encryption methods for your organization
Â·Â Â Â Â Â Â Â Â Compare security technologies, including the latest security appliances
Â·Â Â Â Â Â Â Â Â Implement security policies that will work in your environment
Â·Â Â Â Â Â Â Â Â Scan your network for vulnerabilities
Â·Â Â Â Â Â Â Â Â Evaluate potential security consultants
Â·Â Â Â Â Â Â Â Â Master basic computer forensics and know what to do if youâre attacked
Â·Â Â Â Â Â Â Â Â Learn how cyberterrorism and information warfare are evolving
A fully revised edition of the #1 CISSP training resource
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC)2Â®. CISSP All-in-One Exam Guide, Seventh Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.
Covers all 8 CISSP domains:
Electronic content includes:
ABOUT THE AUTHORS:
Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forceâs Information Warfare unit, an instructor, and an author. She authored several international bestselling books on information security which have sold over a million copies and have been translated into six languages.
Fernando MaymÃ, Ph.D., CISSP, is a security practitioner with over 25 yearsâ experience in the field. He is the author of over a dozen publications and holds three patents. His awards include the U.S. Department of the Army Research and Development Achivement Award and he was recognized as a HENAAC Luminary.
The Principles and Practice of Cryptography and Network Security
Stallingsâ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.
The Seventh Edition streamlines subject matter with new and updated material â including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience.
Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass CompTIA Security+ exam SY0-401, this definitive volume also serves as an essential on-the-job reference.
COVERS ALL EXAM DOMAINS, INCLUDING:
Network security Compliance and operational security Threats and vulnerabilities Application, data, and host security Access control and identity management Cryptography
ELECTRONIC CONTENT INCLUDESl
In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments.
Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.
Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis.
Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware.
While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world.
Manage research, learning and skills at IT1me. Create an account using LinkedIn to manage and organize your IT knowledge. IT1me works like a shopping cart for information -- helping you to save, discuss and share.