Diese Website verwendet Cookies und ähnliche Technologien. Dabei handelt es sich um kleine Textdateien, die auf eurem Computer gespeichert und ausgelesen werden. Indem ihr auf "Alles akzeptieren" klickt, stimmt ihr der Verarbeitung von Daten, der Erstellung und Verarbeitung von individuellen Nutzungsprofilen über Websites und über Partner und Geräte hinweg sowie der Übermittlung eurer Daten an Drittanbieter zu, die eure Daten teilweise in Ländern außerhalb der Europäischen Union verarbeiten (GDPR Art. 49). Einzelheiten hierzu findet ihr in den Datenschutzhinweisen. Die Daten werden für Analysen und für eigene Zwecke Dritter verwendet. Weitere Informationen, auch über die Datenverarbeitung durch Drittanbieter und die Möglichkeit des Widerrufs, findet ihr in den Einstellungen und in unseren Datenschutzhinweisen. Hier könnt ihr mit den notwendigen Tools fortfahren.
- Verlag: Pearson Education
- Autor: William Easttom
- Artikel-Nr.: KNV98576282
- ISBN: 9780137984787
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today's latest attacks and countermeasures
The perfect beginner's guide for anyone interested in a computer security career
Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned.
LEARN HOW TO
- Identify and prioritize potential threats to your network
- Use basic networking knowledge to improve security
- Get inside the minds of hackers, so you can deter their attacks
- Implement a proven layered approach to network security
- Resist modern social engineering attacks
- Defend against today's most common Denial of Service (DoS) attacks
- Halt viruses, spyware, worms, Trojans, and other malware
- Prevent problems arising from malfeasance or ignorance
- Choose the best encryption methods for your organization
- Compare security technologies, including the latest security appliances
- Implement security policies that will work in your environment
- Scan your network for vulnerabilities
- Evaluate potential security consultants
- Master basic computer forensics and know what to do if you're attacked
- Learn how cyberterrorism and information warfare are evolving