ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Internet / Security

Computer Security Fundamentals

| £43.28 | €61.47 | Ca$86.89 | Au$90.46
by Chuck Easttom
What is this?DRM-EPUB by download  |  $63.99
What is this?DRM-PDF by download  |  $63.99
add to cartadd to wish list
Computer Security Fundamentals by Chuck Easttom

Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying.


Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you've learned. Whether you're a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options.


Learn how to

  • Identify the worst threats to your network and assess your risks
  • Get inside the minds of hackers, so you can prevent their attacks
  • Implement a proven layered approach to network security
  • Use basic networking knowledge to improve security
  • Resist the full spectrum of Internet-based scams and frauds
  • Defend against today's most common Denial of Service (DoS) attacks
  • Prevent attacks by viruses, spyware, and other malware
  • Protect against low-tech social engineering attacks
  • Choose the best encryption methods for your organization
  • Select firewalls and other security technologies
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Understand cyberterrorism and information warfare
  • Master basic computer forensics and know what to do after you're attacked


To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 134576

Ebook Details
Pages: 353
Size: 6.1 MB
Publisher: Pearson
Date published:  Dec 2011
ISBN: 9780132828321 (DRM-EPUB)
9780132828260 (DRM-PDF)

DRM Settings
Copying:of 30 selections every 30 days allowed
Printing:of 30 pages every 30 days allowed
Read Aloud:  allowed

Territory Restrictions
This ebook will NOT be sold to customers with a billing address in:
Afghanistan, Algeria, Belarus, Bosnia and Herzegowina, Congo, Congo (The Democratic Republic of the), Cote D'Ivoire, Cuba, Indonesia, Iran (Islamic Republic of), Iraq, Korea (Democratic People's Republic of), Liberia, Libyan Arab Jamahiriya, Macedonia (The Former Yugoslav Republic of), Myanmar, Nigeria, Sudan, Syrian Arab Republic, Zimbabwe

This product is listed in the following category:

Nonfiction > Computers > Internet > Security

This author has products in the following categories:

Nonfiction > Computers > Internet > Security
Nonfiction > Computers > Internet
Nonfiction > Computers > Security
Nonfiction > Computers > Reference
Nonfiction > Computers
Nonfiction > Computers > Information Technology

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

Monday 30 November, 2015
Copyright © 2015