Computer Security Fundamentals, 4th edition

Published by Pearson IT Certification (October 2, 2019) © 2020

  • Chuck Easttom
Products list
  • Available for purchase from all major ebook resellers, including InformIT.com
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com
Products list

Access Details

  • Access courses online from any computer (PC or Mac) or tablet (Android or iOS)
  • Native app available for mobile use; use online, or download and work offline; data syncs automatically 
  • Purchase print or digital codes from your college bookstore, or printed access code cards here

Features

  • Interactive learning elements throughout, including exercises, quizzes, flashcards, and video tutorials

Computer Security Fundamentals, Fourth Edition: 

  • Clearly explains core concepts, terminology, challenges, technologies, and skills
  • Covers today’s latest attacks and countermeasures 
  • The perfect beginner’s guide for anyone interested in a computer security career

Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills students need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps students take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help students deepen their understanding and apply all they've learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

  • Chapter 1: Introduction to Computer Security
  • Chapter 2: Networks and the Internet
  • Chapter 3: Cyber Stalking, Fraud, and Abuse
  • Chapter 4: Denial of Service Attacks
  • Chapter 5: Malware
  • Chapter 6: Techniques Used by Hackers
  • Chapter 7: Industrial Espionage in Cyberspace
  • Chapter 8: Encryption
  • Chapter 9: Computer Security Technology
  • Chapter 10: Security Policies
  • Chapter 11: Network Scanning and Vulnerability Scanning
  • Chapter 12: Cyber Terrorism and Information Warfare
  • Chapter 13: Cyber Detective
  • Chapter 14: Introduction to Forensics
  • Chapter 15: Cybersecurity Engineering
  • Glossary
  • Appendix A: Resources
  • Appendix B: Answers to the Multiple Choice Questions

Need help? Get in touch