Computer security fundamentals / Dr. Chuck Easttom.
الناشر: [Indianapolis, Indiana] : Pearson Education, Inc., [2019] الطبعة: Fourth editionالوصف: a xxvi, 485 pages : b illustrations ; 24 cmتدمك:- 9780135774779
- 005.8 23 E C C
| نوع المادة | المكتبة الرئيسية | موقع الترفيف | رقم الاستدعاء | رقم النسخة | حالة | ملاحظات | تاريخ الاستحقاق | الباركود | |
|---|---|---|---|---|---|---|---|---|---|
| كتب | المكتبة الأمنية | القاعة الرئيسية | 005.8 E C C (استعراض الرف(يفتح أدناه)) | 1 | لا تعار | كتب أجنبية | 010058603 | ||
| كتب | المكتبة الأمنية | القاعة الرئيسية | 005.8 E C C (استعراض الرف(يفتح أدناه)) | 2 | المتاح | كتب أجنبية | 010058602 | ||
| كتب | المكتبة الأمنية | القاعة الرئيسية | 005.8 E C C (استعراض الرف(يفتح أدناه)) | 3 | معارة | كتب أجنبية | 18/09/2025 | 010058601 |
استعرض المكتبة الأمنية رفاً,موقع الترفيف: القاعة الرئيسية إغلاق مستعرض الرف (يخفي مستعرض الرف)
| 005.8 E C C Computer security fundamentals / | 005.8 E C C Computer security fundamentals / | 005.8 E C C Computer security fundamentals / | 005.8 E C C Computer security fundamentals / | 005.8 E C C Computer security fundamentals / | 005.8 E C C Computer security fundamentals / | 005.8 F J A Absolute beginner's guide to personal firewalls / |
Place of publication taken from the publisher's website.
Previous edition: Indianapolis : Pearson, 2016.
Includes bibliographical references and index.
Introduction to Computer Security -- Networks and the Internet -- Cyber Stalking, Fraud and Abuse -- Denial of Service Attacks -- Malware -- Techniques used by Hackers -- Industrial Espionage in Cyberspace -- Encryption -- Computer Security Software -- Security Policies -- Network Scanning and Vulnerability Scanning -- Cyber Terrorism and Information Warfare -- Cyber Detective -- Introduction to Forensics -- Cybersecurity Engineering
"[This book] explains core concepts, terminology, challenges, technologies, and skills; covers today's latest attacks and countermeasures ... Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills students need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps students take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs [virtual private networks], password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help students deepen their understanding and apply all they've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets, and expand your career options"--Provided by the publisher.