Computer Security Fundamentals (4e) : 9780135774779

Computer Security Fundamentals (4e)

Easttom II,W
Published by
Pearson Higher Ed USA
In stock
Title type
Title type
Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

  • Identify and prioritise potential threats to your network
  • Use basic networking knowledge to improve security
  • Get inside the minds of hackers, so you can deter their attacks
  • Implement a proven layered approach to network security
  • Resist modern social engineering attacks
  • Defend against today’s most common Denial of Service (DoS) attacks
  • Halt viruses, spyware, worms, Trojans, and other malware
  • Prevent problems arising from malfeasance or ignorance
  • Choose the best encryption methods for your organisation
  • Compare security technologies, including the latest security appliances
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Master basic computer forensics and know what to do if you’re attacked
  • Learn how cyberterrorism and information warfare are evolving
Table of contents
  • Chapter 1: Introduction to Computer Security
  • Chapter 2: Networks and the Internet
  • Chapter 3: Cyber Stalking, Fraud, and Abuse
  • Chapter 4: Denial of Service Attacks
  • Chapter 5: Malware
  • Chapter 6: Techniques Used by Hackers
  • Chapter 7: Industrial Espionage in Cyberspace
  • Chapter 8: Encryption
  • Chapter 9: Computer Security Technology
  • Chapter 10: Security Policies
  • Chapter 11: Network Scanning and Vulnerability Scanning
  • Chapter 12: Cyber Terrorism and Information Warfare
  • Chapter 13: Cyber Detective
  • Chapter 14: Introduction to Forensics
  • Chapter 15: Cybersecurity Engineering
  • Glossary
  • Appendix A: Resources
  • Appendix B: Answers to the Multiple Choice Questions