Computer Security Fundamentals
<p style="margin:0px;">ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Clearly explains core concepts, terminology, challenges, technologies, and skills</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Covers today’s latest attacks and countermeasures <br> </p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">The perfect beginner’s guide for anyone interested in a computer security career</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. </p> <p style="margin:0px;">Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Learn how to</p> <p style="margin:0px;">·        Identify and prioritize potential threats to your network</p> <p style="margin:0px;">·        Use basic networking knowledge to improve security</p> <p style="margin:0px;">·        Get inside the minds of hackers, so you can deter their attacks</p> <p style="margin:0px;">·        Implement a proven layered approach to network security</p> <p style="margin:0px;">·        Resist modern social engineering attacks</p> <p style="margin:0px;">·        Defend against today’s most common Denial of Service (DoS) attacks</p> <p style="margin:0px;">·        Halt viruses, spyware, worms, Trojans, and other malware</p> <p style="margin:0px;">·        Prevent problems arising from malfeasance or ignorance</p> <p style="margin:0px;">·        Choose the best encryption methods for your organization</p> <p style="margin:0px;">·        Compare security technologies, including the latest security appliances</p> <p style="margin:0px;">·        Implement security policies that will work in your environment</p> <p style="margin:0px;">·        Scan your network for vulnerabilities</p> <p style="margin:0px;">·        Evaluate potential security consultants</p> <p style="margin:0px;">·        Master basic computer forensics and know what to do if you’re attacked</p> <p style="margin:0px;">·        Learn how cyberterrorism and information warfare are evolving</p> <p style="margin:0px;"> </p>