Computer Security Fundamentals

Computer Security Fundamentals pdf epub mobi txt 电子书 下载 2025

出版者:Que
作者:William (Chuck) Easttom
出品人:
页数:352
译者:
出版时间:2011-12-30
价格:USD 79.99
装帧:Paperback
isbn号码:9780789748904
丛书系列:
图书标签:
  • 计算机科学 
  • Security 
  • Fundamentals 
  • Computer 
  • 2011 
  •  
想要找书就要到 图书目录大全
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you've learned. Whether you're a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options. Learn how to * Identify the worst threats to your network and assess your risks * Get inside the minds of hackers, so you can prevent their attacks * Implement a proven layered approach to network security * Use basic networking knowledge to improve security * Resist the full spectrum of Internet-based scams and frauds * Defend against today's most common Denial of Service (DoS) attacks * Prevent attacks by viruses, spyware, and other malware * Protect against low-tech social engineering attacks * Choose the best encryption methods for your organization * Select firewalls and other security technologies * Implement security policies that will work in your environment * Scan your network for vulnerabilities * Evaluate potential security consultants * Understand cyberterrorism and information warfare * Master basic computer forensics and know what to do after you're attacked

具体描述

读后感

评分

评分

评分

评分

评分

用户评价

评分

评分

评分

评分

评分

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有