Computer Security Fundamentals
Publication details: Indianapolis, Indiana: Pearson Education, Inc., 2016Edition: 3Description: 426ISBN:- 9780789757463
- 005.8 EAS
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15874 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15876 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15872 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15871 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15878 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15873 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15875 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Not for loan | E15870 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15877 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 EAS (Browse shelf(Opens below)) | Available | E15879 |
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned.
Whether you're a student, a professional, or a manager, this guide will help you protect your assets-and expand your career options.
There are no comments on this title.