Book description
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today’s latest attacks and countermeasures
The perfect beginner’s guide for anyone interested in a computer security career
Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.
Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.
LEARN HOW TO
Identify and prioritize potential threats to your network
Use basic networking knowledge to improve security
Get inside the minds of hackers, so you can deter their attacks
Implement a proven layered approach to network security
Resist modern social engineering attacks
Defend against today’s most common Denial of Service (DoS) attacks
Halt viruses, spyware, worms, Trojans, and other malware
Prevent problems arising from malfeasance or ignorance
Choose the best encryption methods for your organization
Compare security technologies, including the latest security appliances
Implement security policies that will work in your environment
Scan your network for vulnerabilities
Evaluate potential security consultants
Master basic computer forensics and know what to do if you’re attacked
Learn how cyberterrorism and information warfare are evolving
Table of contents
- Cover Page
- About This eBook
- Title Page
- Copyright Page
- Credits
- Contents at a Glance
- Table of Contents
- About the Author
- About the Technical Reviewer
- Dedication
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
-
Chapter 1. Introduction to Computer Security
- Introduction
- How Seriously Should You Take Threats to Network Security?
- Identifying Types of Threats
- Assessing the Likelihood of an Attack on Your Network
- Basic Security Terminology
- Concepts and Approaches
- How Do Legal Issues Impact Network Security?
- Online Security Resources
- Summary
- Test Your Skills
- Chapter 2. Networks and the Internet
- Chapter 3. Cyber Stalking, Fraud, and Abuse
- Chapter 4. Denial of Service Attacks
- Chapter 5. Malware
- Chapter 6. Techniques Used by Hackers
- Chapter 7. Industrial Espionage in Cyberspace
-
Chapter 8. Encryption
- Introduction
- Cryptography Basics
- History of Encryption
- Modern Cryptography Methods
- Public Key (Asymmetric) Encryption
- PGP
- Legitimate Versus Fraudulent Encryption Methods
- Digital Signatures
- Hashing
- MAC and HMAC
- Steganography
- Cryptanalysis
- Cryptography Used on the Internet
- Quantum Computing Cryptography
- Summary
- Test Your Skills
- Chapter 9. Computer Security Technology
- Chapter 10. Security Policies
- Chapter 11. Network Scanning and Vulnerability Scanning
-
Chapter 12. Cyber Terrorism and Information Warfare
- Introduction
- Actual Cases of Cyber Terrorism
- Weapons of Cyber Warfare
- Economic Attacks
- Military Operations Attacks
- General Attacks
- Supervisory Control and Data Acquisitions (SCADA)
- Information Warfare
- Actual Cases
- Future Trends
- Defense Against Cyber Terrorism
- Terrorist Recruiting and Communication
- TOR and the Dark Web
- Summary
- Test Your Skills
- Chapter 13. Cyber Detective
-
Chapter 14. Introduction to Forensics
- Introduction
- General Guidelines
- Finding Evidence on the PC
- Finding Evidence in System Logs
- Getting Back Deleted Files
- Operating System Utilities
- The Windows Registry
- Mobile Forensics: Cell Phone Concepts
- The Need for Forensic Certification
- Expert Witnesses
- Additional Types of Forensics
- Summary
- Test Your Skills
- Chapter 15. Cybersecurity Engineering
- Glossary
- Appendix A. Resources
- Appendix B. Answers to the Multiple Choice Questions
- Index
- Code Snippets
Product information
- Title: Computer Security Fundamentals, 4th Edition
- Author(s):
- Release date: October 2019
- Publisher(s): Pearson IT Certification
- ISBN: 9780135774854
You might also like
book
Computer Security Fundamentals, 5th Edition
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's …
book
Computer Security Handbook, Fifth Edition
The classic and authoritative reference in the field of computer security, now completely updated and revised. …
book
Fundamentals of Information Systems Security, 4th Edition
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers …
book
Fundamentals of Information Systems Security, 3rd Edition
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third …