<span><p>Clearly explains core concepts, terminology, challenges, technologies, and skills</p><p></p><p>Covers today's latest attacks and countermeasures</p><p></p><p>The perfect beginner's guide for anyone interested in a computer security career</p><p></p><p>Dr. Chuck Easttom brings together compl
Computer Security Fundamentals, 4th Edition
โ Scribed by Safari, an O'Reilly Media Company.; Easttom, Chuck
- Publisher
- Pearson IT Certification
- Year
- 2019
- Tongue
- English
- Leaves
- 649
- Edition
- 1st edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets-and expand your career options. LEARN HOW TO Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today's most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you're attacked Learn how cyberterrorism and information warfare are evolving.
โฆ Table of Contents
About This eBook......Page 2
Title Page......Page 3
Copyright Page......Page 4
Credits......Page 7
Contents at a Glance......Page 13
Table of Contents......Page 14
About the Author......Page 28
About the Technical Reviewer......Page 29
Dedication......Page 30
Acknowledgments......Page 31
We Want to Hear from You!......Page 32
Reader Services......Page 33
Introduction......Page 34
Introduction......Page 36
How Seriously Should You Take Threats to Network Security?......Page 37
Identifying Types of Threats......Page 39
Basic Security Terminology......Page 46
Concepts and Approaches......Page 49
How Do Legal Issues Impact Network Security?......Page 51
Summary......Page 52
Test Your Skills......Page 53
Introduction......Page 58
Network Basics......Page 59
How the Internet Works......Page 71
History of the Internet......Page 81
Basic Network Utilities......Page 83
Advanced Network Communications Topics......Page 92
Test Your Skills......Page 96
Introduction......Page 105
How Internet Fraud Works......Page 106
Identity Theft......Page 112
Cyber Stalking......Page 115
Protecting Yourself Against Cybercrime......Page 127
Test Your Skills......Page 135
DoS Attacks......Page 143
Illustrating an Attack......Page 144
Common Tools Used for DoS Attacks......Page 147
DoS Weaknesses......Page 150
Specific DoS Attacks......Page 151
Real-World Examples of DoS Attacks......Page 161
How to Defend Against DoS Attacks......Page 164
Test Your Skills......Page 166
Introduction......Page 175
Viruses......Page 176
Trojan Horses......Page 188
The Buffer-Overflow Attack......Page 191
Spyware......Page 194
Other Forms of Malware......Page 198
Detecting and Eliminating Viruses and Spyware......Page 202
Summary......Page 208
Test Your Skills......Page 209
Basic Terminology......Page 216
The Reconnaissance Phase......Page 217
Actual Attacks......Page 223
Malware Creation......Page 228
Penetration Testing......Page 230
The Dark Web......Page 232
Test Your Skills......Page 233
Introduction......Page 237
What Is Industrial Espionage?......Page 238
Information as an Asset......Page 239
Real-World Examples of Industrial Espionage......Page 243
How Does Espionage Occur?......Page 245
Protecting Against Industrial Espionage......Page 250
Spear Phishing......Page 254
Test Your Skills......Page 255
Cryptography Basics......Page 262
History of Encryption......Page 263
Modern Cryptography Methods......Page 268
Public Key (Asymmetric) Encryption......Page 274
PGP......Page 277
Digital Signatures......Page 278
Hashing......Page 279
MAC and HMAC......Page 280
Steganography......Page 281
Cryptanalysis......Page 282
Cryptography Used on the Internet......Page 283
Test Your Skills......Page 284
Introduction......Page 289
Virus Scanners......Page 290
Firewalls......Page 295
Antispyware......Page 301
IDSs......Page 302
Digital Certificates......Page 316
SSL/TLS......Page 318
Virtual Private Networks......Page 321
Wi-Fi Security......Page 324
Test Your Skills......Page 325
Introduction......Page 331
What Is a Policy?......Page 332
Defining User Policies......Page 333
Defining System Administration Policies......Page 344
Defining Access Control......Page 351
Development Policies......Page 353
Standards, Guidelines, and Procedures......Page 354
Disaster Recovery......Page 355
Important Laws......Page 360
Summary......Page 361
Test Your Skills......Page 362
Introduction......Page 371
Basics of Assessing a System......Page 372
Securing Computer Systems......Page 383
Scanning Your Network......Page 391
Getting Professional Help......Page 403
Test Your Skills......Page 407
Introduction......Page 417
Actual Cases of Cyber Terrorism......Page 418
Weapons of Cyber Warfare......Page 421
Economic Attacks......Page 424
Military Operations Attacks......Page 427
Supervisory Control and Data Acquisitions (SCADA)......Page 428
Information Warfare......Page 429
Actual Cases......Page 434
Future Trends......Page 439
Defense Against Cyber Terrorism......Page 443
Terrorist Recruiting and Communication......Page 444
TOR and the Dark Web......Page 445
Summary......Page 447
Test Your Skills......Page 448
Introduction......Page 454
General Searches......Page 456
Court Records and Criminal Checks......Page 460
Usenet......Page 465
Test Your Skills......Page 467
General Guidelines......Page 474
Finding Evidence on the PC......Page 482
Finding Evidence in System Logs......Page 483
Getting Back Deleted Files......Page 484
Operating System Utilities......Page 486
The Windows Registry......Page 488
Mobile Forensics: Cell Phone Concepts......Page 490
The Need for Forensic Certification......Page 494
Expert Witnesses......Page 495
Additional Types of Forensics......Page 496
Test Your Skills......Page 498
Introduction......Page 500
Defining Cybersecurity Engineering......Page 501
SecML......Page 511
Test Your Skills......Page 524
Glossary......Page 527
Port Scanners and Sniffers......Page 534
Virus Research......Page 535
Chapter 1......Page 537
Chapter 2......Page 538
Chapter 3......Page 539
Chapter 5......Page 540
Chapter 6......Page 541
Chapter 7......Page 542
Chapter 9......Page 543
Chapter 10......Page 544
Chapter 11......Page 545
Chapter 13......Page 546
Chapter 15......Page 547
Index......Page 548
Code Snippets......Page 625
โฆ Subjects
Electronic books
๐ SIMILAR VOLUMES
One-volume introduction to computer security. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, a
Featuring a strong emphasis on the fundamentals underlying contemporary logic design using hardware description languages, synthesis, and verification, this book focuses on the ever-evolving applications of basic computer design concepts with strong connections to real-world technology. Treatment
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about h
Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover or pages, Sale restriction may be printed on the book, but Book name, contents, and author are exactly same as Hardcover Edition. Fast delivery through DHL/FedEx express.
<P style="MARGIN: 0px"> <I>For courses in Logic and Computer design.</I> </P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px"> <B>Understanding Logic and Computer Design for All Audiences</B> </P> <P style="MARGIN: 0px"> <B> <I>Logic and Computer Design Fundamentals</I> </B> is a thoroughly u