Book description
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today's latest attacks and countermeasures
The perfect beginner's guide for anyone interested in a computer security career
Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned.
LEARN HOW TO
Identify and prioritize potential threats to your network
Use basic networking knowledge to improve security
Get inside the minds of hackers, so you can deter their attacks
Implement a proven layered approach to network security
Resist modern social engineering attacks
Defend against todays most common Denial of Service (DoS) attacks
Halt viruses, spyware, worms, Trojans, and other malware
Prevent problems arising from malfeasance or ignorance
Choose the best encryption methods for your organization
Compare security technologies, including the latest security appliances
Implement security policies that will work in your environment
Scan your network for vulnerabilities
Evaluate potential security consultants
Master basic computer forensics and know what to do if youre attacked
Learn how cyberterrorism and information warfare are evolving
Table of contents
- Cover Page
- About This eBook
- Title Page
- Copyright Page
- Pearson’s Commitment to Diversity, Equity, and Inclusion
- Credits
- Contents at a Glance
- Table of Contents
- About the Author
- About the Technical Reviewer
- Dedication Page
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
- Chapter 1. Introduction to Computer Security
- Chapter 2. Networks and the Internet
- Chapter 3. Cyber Stalking, Fraud, and Abuse
- Chapter 4. Denial of Service Attacks
- Chapter 5. Malware
- Chapter 6. Techniques Used by Hackers
- Chapter 7. Industrial Espionage in Cyberspace
-
Chapter 8. Encryption
- Introduction
- Cryptography Basics
- History of Encryption
- Modern Cryptography Methods
- Public Key (Asymmetric) Encryption
- PGP
- Legitimate Versus Fraudulent Encryption Methods
- Digital Signatures
- Hashing
- MAC and HMAC
- Steganography
- Cryptanalysis
- Cryptography Used on the Internet
- Quantum Computing Cryptography
- Summary
- Chapter 9. Computer Security Technology
- Chapter 10. Security Policies
- Chapter 11. Network Scanning and Vulnerability Scanning
-
Chapter 12. Cyber Terrorism and Information Warfare
- Introduction
- Actual Cases of Cyber Terrorism
- Weapons of Cyber Warfare
- Economic Attacks
- Military Operations Attacks
- General Attacks
- Supervisory Control and Data Acquisitions (SCADA)
- Information Warfare
- Actual Cases of Cyber Terrorism
- Future Trends
- Defense Against Cyber Terrorism
- Terrorist Recruiting and Communication
- TOR and the Dark Web
- Summary
- Chapter 13. Cyber Detective
- Chapter 14. Introduction to Forensics
- Chapter 15. Cybersecurity Engineering
- Glossary
- Appendix A: Resources
- Appendix B: Answers to the Multiple Choice Questions
- Index
- Code Snippets
Product information
- Title: Computer Security Fundamentals, 5th Edition
- Author(s):
- Release date: February 2023
- Publisher(s): Pearson IT Certification
- ISBN: 9780137984756
You might also like
book
Fundamentals of Information Systems Security, 3rd Edition
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Fundamentals of Information Systems Security, 4th Edition
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …