- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
Used Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Computer Security Fundamentals-text Only (2ND 12 Edition)by Chuck Easttom
Synopses & ReviewsPlease note that used books may not include additional media (study guides, CDs, DVDs, solutions manuals, etc.) as described in the publisher comments.
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying.
Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you’ve learned. Whether you’re a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options.
Learn how to
Computer Security Fundamentals, Second Edition is designed to be the ideal one-volume gateway into the entire field of computer security. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to security. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as vulnerability assessment, virus attacks, buffer overflow, hacking, spyware, network defense, firewalls, VPNs, Intrusion Detection Systems, and passwords. Unlike many other authors, however, he also fully addresses more specialized issues, including cyber terrorism, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates. This edition has been extensively updated to address the latest issues and technologies, including cyberbullying/cyberstalking, session hijacking, steganography, and more. Its examples have been updated to reflect the current state-of-the-art in both attacks and defense. End-of-chapter exercises, projects, and review questions guide readers in applying the knowledge they've gained, and Easttom offers many tips that readers would otherwise have to discover through hard experience.
About the Author
Chuck Easttom spent many years in the IT industry, followed by three years teaching computer science and security at a technical college. He has since returned to industry as an IT manager with system security responsibilities. Easttom has authored eleven other books on programming, Web development, and Linux. His 20+ industry certifications include CIW Security Analyst, MCSE, MCSA, MCDBA, MCAD, and Server+. He has also served as a subject matter expert for CompTIA in developing or revising four certification exams, including Security+. Easttom currently teaches computer/network security courses at two colleges, and does additional computer security consulting work.
Table of Contents
1. Introduction to Computer Security
2. The Basics of Networks and Internet
3. Cyber Stalking, Fraud, and Abuse
4. Industrial Espionage in Cyberspace
5. Finding Information about a Target System
6. Denial of Service Attacks
7. Virii, Trojan Horses, and Buffer Overflow Attacks
8. General Security Measures
9. Encryption 101
10. Cyber Terrorism and Information Warfare
11. Technical Aspects of Computer Security
12. the Basics of Assessing a System
13. Cyber Detective: Finding What You Need to Know on the Net
What Our Readers Are Saying