ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers todayâs latest attacks and countermeasures
The perfect beginnerâs guide for anyone interested in a computer security career
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youâve learned.
Whether youâre a student, a professional, or a manager, this guide will help you protect your assetsâand expand your career options.
Learn how to
Â·Â Â Â Â Â Â Â Â Identify and prioritize potential threats to your network
Â·Â Â Â Â Â Â Â Â Use basic networking knowledge to improve security
Â·Â Â Â Â Â Â Â Â Get inside the minds of hackers, so you can deter their attacks
Â·Â Â Â Â Â Â Â Â Implement a proven layered approach to network security
Â·Â Â Â Â Â Â Â Â Resist modern social engineering attacks
Â·Â Â Â Â Â Â Â Â Defend against todayâs most common Denial of Service (DoS) attacks
Â·Â Â Â Â Â Â Â Â Halt viruses, spyware, worms, Trojans, and other malware
Â·Â Â Â Â Â Â Â Â Prevent problems arising from malfeasance or ignorance
Â·Â Â Â Â Â Â Â Â Choose the best encryption methods for your organization
Â·Â Â Â Â Â Â Â Â Compare security technologies, including the latest security appliances
Â·Â Â Â Â Â Â Â Â Implement security policies that will work in your environment
Â·Â Â Â Â Â Â Â Â Scan your network for vulnerabilities
Â·Â Â Â Â Â Â Â Â Evaluate potential security consultants
Â·Â Â Â Â Â Â Â Â Master basic computer forensics and know what to do if youâre attacked
Â·Â Â Â Â Â Â Â Â Learn how cyberterrorism and information warfare are evolving
In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.
Learn how to:
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of :
-Â Fundamental new security
-Â Cryptographic protocols and design,
-Â A new way of measuring network vulnerability: attack surfaces,
-Â Network vulnerability and building impenetrable systems,
-Â Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.
With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.
Manage research, learning and skills at IT1me. Create an account using LinkedIn to manage and organize your IT knowledge. IT1me works like a shopping cart for information -- helping you to save, discuss and share.