Skip to content

Computer Security Fundamentals

ISBN-10: 0131711296

ISBN-13: 9780131711297

Edition: 2006

Authors: William Easttom, Chuck Easttom

List price: $83.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

KEY BENEFIT: This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security.nbsp; Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. nbsp;Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software.nbsp; For system analysts network administrators, network security professionals and security audit professionals.
Customers also bought

Book details

List price: $83.00
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 3/3/2005
Binding: Paperback
Pages: 368
Size: 7.50" wide x 9.25" long x 0.75" tall
Weight: 1.210
Language: English

Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications.

Introduction to Cyber Crime and Security
Networks and the Internet
Assessing a Target System
Denial of Service Attacks
Malware
Basics of Assessing and Securing a System
Encryption
Internet Fraud, and Cyber Crime
Industrial Espionage
Cyber Terrorism and Information Warfare
Cyber Detective
Security Hardware and Software
Glossary
Resources
References