From
HPB-Red, Dallas, TX, U.S.A.
Seller rating 5 out of 5 stars
AbeBooks Seller since March 11, 2019
Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_371008875
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today&;s latest attacks and countermeasures
The perfect beginner&;s guide for anyone interested in a computer security career
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.
Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.
Learn how to
·         Identify and prioritize potential threats to your network
·         Use basic networking knowledge to improve security
·         Get inside the minds of hackers, so you can deter their attacks
·         Implement a proven layered approach to network security
·         Resist modern social engineering attacks
·         Defend against today&;s most common Denial of Service (DoS) attacks
·         Halt viruses, spyware, worms, Trojans, and other malware
·         Prevent problems arising from malfeasance or ignorance
·         Choose the best encryption methods for your organization
·         Compare security technologies, including the latest security appliances
·         Implement security policies that will work in your environment
·         Scan your network for vulnerabilities
·         Evaluate potential security consultants
·         Master basic computer forensics and know what to do if you&;re attacked
·         Learn how cyberterrorism and information warfare are evolving
 
About the Author:
Chuck Easttom has many years of practical experience in all aspects ofIT. He holds a Doctor of Science in CyberSecurity and 3 mastersdegrees(including 1 in applied computer science and 1 in systemsengineering). He has authored 26 computer science books ( so far) and is an inventor with fifteen computer science patents, and numerousresearch papers on topics such as digital forensics, cyber warfare,engineering processes,cryptography, and other areas.
He was a subject matter expert for CompTIA in the creation of their Security+, Linux+,and Server+certification tests and on the Job Task Analysis team for CEH v8. He created the OSForensics certification test and course. Hecurrently holds over 40 IT certifications (A+,Network+, iNet+, Linux+,Server+,MCP, MCAD, MCSA, MCSE, MCDBA,MCTS,MCITP, CEH, CHFI, CISSP, CCFP, ISSAP,and more).
Dr. Easttom is frequently a speaker oncomputer science related topics,often specifically on computer securityand related subjects. In the past he has been a speaker at: HackerHalted, TakedownCon, Secure World, ISC2 Security Congress, HarvardComputer Society, Columbia University ACM chapter, University of Texasat Dallas ACM Chapter, Southern Methodist University ResearchColloquium, Hakon India, Defcon, Enfuse, to name a few. He has spoken on the history of viruses, cryptographic back doors,cryptanalysis, cyberwarfare and terrorism, the details of the cryptographic algorithms,quantum computing, engineering processes, forensic report writing, and other computer science and security topics. He isalso a Distinguished Speaker of the ACM, as well as a member of the ACMand INCOSE and a Senior Member of the IEEE.
Title: Computer Security Fundamentals (Pearson It ...
Publisher: Pearson IT Certification
Publication Date: 2016
Binding: Paperback
Condition: Acceptable
Edition: 3rd Edition
Seller: BookHolders, Towson, MD, U.S.A.
Condition: Good. [ No Hassle 30 Day Returns ][ Ships Daily ] [ Underlining/Highlighting: NONE ] [ Writing: NONE ] [ Edition: third ] Publisher: Pearson IT Certification Pub Date: 6/23/2016 Binding: Paperback Pages: 448 third edition. Seller Inventory # 6879763
Seller: A Team Books, Conway, AR, U.S.A.
paperback. Condition: Good. Used books may not include access codes or one time use codes. Proven Seller with Excellent Customer Service. Choose expedited shipping and get it FAST. Seller Inventory # sun0000006959
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: Good. 3rd Edition. Ships same day or next business day! UPS shipping available (Priority Mail for AK/HI/APO/PO Boxes). Used sticker and some writing and/or highlighting. Used books may not include working access code. Used books will not include dust jackets. Seller Inventory # 001850874U
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00065031849
Seller: Giant Giant, Reston, VA, U.S.A.
paperback. Condition: UsedAcceptable. Acceptable condition.May contain some marking/highlighting. Cover and pages show some wear/moisture damage. Not Satisfied? Contact us to get a refund. Seller Inventory # BRG-33_2_457
Seller: Better World Books Ltd, Dunfermline, United Kingdom
Condition: Very Good. 3rd Edition. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 18948736-6
Quantity: 1 available
Seller: ThriftBooks-Phoenix, Phoenix, AZ, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G078975746XI3N00
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G078975746XI3N00
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G078975746XI3N00
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 3rd Edition. Used book that is in clean, average condition without any missing pages. Seller Inventory # 17129186-6