0%

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today's latest attacks and countermeasures

The perfect beginner's guide for anyone interested in a computer security career

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned.

LEARN HOW TO

  • Identify and prioritize potential threats to your network

  • Use basic networking knowledge to improve security

  • Get inside the minds of hackers, so you can deter their attacks

  • Implement a proven layered approach to network security

  • Resist modern social engineering attacks

  • Defend against todays most common Denial of Service (DoS) attacks

  • Halt viruses, spyware, worms, Trojans, and other malware

  • Prevent problems arising from malfeasance or ignorance

  • Choose the best encryption methods for your organization

  • Compare security technologies, including the latest security appliances

  • Implement security policies that will work in your environment

  • Scan your network for vulnerabilities

  • Evaluate potential security consultants

  • Master basic computer forensics and know what to do if youre attacked

  • Learn how cyberterrorism and information warfare are evolving

Table of Contents

  1. Cover Page
  2. About This eBook
  3. Title Page
  4. Copyright Page
  5. Pearson’s Commitment to Diversity, Equity, and Inclusion
  6. Credits
  7. Contents at a Glance
  8. Table of Contents
  9. About the Author
  10. About the Technical Reviewer
  11. Dedication Page
  12. Acknowledgments
  13. We Want to Hear from You!
  14. Reader Services
  15. Introduction
  16. Chapter 1. Introduction to Computer Security
  17. Chapter 2. Networks and the Internet
  18. Chapter 3. Cyber Stalking, Fraud, and Abuse
  19. Chapter 4. Denial of Service Attacks
  20. Chapter 5. Malware
  21. Chapter 6. Techniques Used by Hackers
  22. Chapter 7. Industrial Espionage in Cyberspace
  23. Chapter 8. Encryption
  24. Chapter 9. Computer Security Technology
  25. Chapter 10. Security Policies
  26. Chapter 11. Network Scanning and Vulnerability Scanning
  27. Chapter 12. Cyber Terrorism and Information Warfare
  28. Chapter 13. Cyber Detective
  29. Chapter 14. Introduction to Forensics
  30. Chapter 15. Cybersecurity Engineering
  31. Glossary
  32. Appendix A: Resources
  33. Appendix B: Answers to the Multiple Choice Questions
  34. Index
  35. Code Snippets