Photo 1/1

Galerie
Photo 1/1

Vous en avez un à vendre ?
Fondamentaux de sécurité informatique
6,99 USD
Environ5,99 EUR
État :
Bon état
Livre ayant déjà été lu, mais qui est toujours en bon état. La couverture présente des dommages mineurs, comme des éraflures, mais n'est ni trouée ni déchirée. Pour les couvertures rigides, la jaquette n'est pas nécessairement incluse. La reliure présente des marques d'usure mineures. La majorité des pages sont intactes. Pliures et déchirures mineures. Soulignement de texte mineur au crayon. Aucun surlignement de texte. Aucune note dans les marges. Aucune page manquante. Consulter l'annonce du vendeur pour avoir plus de détails et voir la description des défauts.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Livraison :
Gratuit USPS Media MailTM.
Lieu où se trouve l'objet : Haltom City, Texas, États-Unis
Délai de livraison :
Estimé entre le sam. 9 août et le ven. 15 août à 94104
Retours :
Retour sous 30 jours. L'acheteur paie les frais de retour. Si vous utilisez un bordereau d'affranchissement eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
Achetez en toute confiance
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :156026888214
Dernière mise à jour le 06 août 2025 17:52:02 CEST. Afficher toutes les modificationsAfficher toutes les modifications
Caractéristiques de l'objet
- État
- Release Year
- 2016
- Book Title
- Computer Security Fundamentals
- ISBN
- 9780789757463
À propos de ce produit
Product Identifiers
Publisher
Cisco Press
ISBN-10
078975746X
ISBN-13
9780789757463
eBay Product ID (ePID)
2309538733
Product Key Features
Number of Pages
448 Pages
Publication Name
Computer Security Fundamentals
Language
English
Publication Year
2016
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Type
Textbook
Subject Area
Computers
Series
Pearson It Cybersecurity Curriculum (Itcc) Ser.
Format
Trade Paperback
Dimensions
Item Height
1.2 in
Item Weight
25.2 Oz
Item Length
9 in
Item Width
7 in
Additional Product Features
Edition Number
3
Intended Audience
College Audience
LCCN
2016-940227
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction Chapter 1: Introduction to Computer Security Introduction How Seriously Should You Take Threats to Network Security? Identifying Types of Threats Malware Compromising System Security DoS Attacks Web Attacks Session Hijacking Insider Threats DNS Poisoning New Attacks Assessing the Likelihood of an Attack on Your Network Basic Security Terminology Hacker Slang Professional Terms Concepts and Approaches How Do Legal Issues Impact Network Security? Online Security Resources CERT Microsoft Security Advisor F-Secure SANS Institute Summary Test Your Skills Chapter 2: Networks and the Internet Introduction Network Basics The Physical Connection: Local Networks Faster Connection Speeds Data Transmission How the Internet Works IP Addresses CIDR Uniform Resource Locators What Is a Packet? Basic Communications History of the Internet Basic Network Utilities IPConfig Ping Tracert Netstat NSLookup Other Network Devices Advanced Network Communications Topics The OSI Model Media Access Control (MAC) Addresses Summary Test Your Skills Chapter 3: Cyber Stalking, Fraud, and Abuse Introduction How Internet Fraud Works Investment Offers Auction Frauds Identity Theft Phishing Cyber Stalking Real Cyber Stalking Cases How to Evaluate Cyber Stalking Crimes Against Children Laws About Internet Fraud Protecting Yourself Against Cyber Crime Protecting Against Investment Fraud Protecting Against Identity Theft Secure Browser Settings Summary Test Your Skills Chapter 4: Denial of Service Attacks Introduction DoS Illustrating an Attack Common Tools Used for DoS DoS Weaknesses Specific DoS Attacks Land Attack DDoS Summary Test Your Skills Chapter 5: Malware Introduction Viruses How a Virus Spreads Types of Viruses Virus Examples Rombertik Gameover ZeuS CryptoLocker and CryptoWall FakeAV MacDefender Troj/Invo-Zip W32/Netsky-P The Sobig Virus The Mimail Virus The Bagle Virus A Nonvirus Virus Flame Rules for Avoiding Viruses Trojan Horses The Buffer-Overflow Attack The Sasser Virus/Buffer Overflow Spyware Legal Uses of Spyware How Is Spyware Delivered to a Target System? Obtaining Spyware Software Other Forms of Malware Rootkit Malicious Web-Based Code Logic Bombs Spam Advanced Persistent Threats Detecting and Eliminating Viruses and Spyware Antivirus Software Antispyware Software Remediation Steps Summary Test Your Skills Chapter 6: Techniques Used by Hackers Introduction Basic Terminology The Reconnaissance Phase Passive Scanning Techniques Active Scanning Techniques Actual Attacks SQL Script Injection Cross-Site Scripting Password Cracking Malware Creation Windows Hacking Techniques Penetration Testing NIST 800-115 National Security Agency Information Assessment Methodology PCI Penetration Testing Standard Summary Test Your Skills Chapter 7: Industrial Espionage in Cyberspace Introduction What Is Industrial Espionage? Information as an Asset Real-World Examples of Industrial Espionage Example 1: Houston Astros Example 2: University Trade Secrets Example 3: VIA Technology Example 4: General Motors Example 5: Bloomberg, Inc. Example 6: Interactive Television Technologies, Inc. Trends in Industrial Espionage Industrial Espionage and You How Does Espionage Occur? Low-Tech Industrial Espionage Spyware Used in Industrial Espionage Steganography Used in Industrial Espionage Phone Taps and Bugs Protecting Against Industrial Espionage Industrial Espionage Act Spear Phishing Summary Test Your Skills Chapter 8: Encryption Introduction Cryptography Basics History of Encryption The Caesar Cipher Atbash Multi-Alphabet Substitution Rail Fence Enigma <p style="margin:0px
Synopsis
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today's most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you're attacked · Learn how cyberterrorism and information warfare are evolving, ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to - Identify and prioritize potential threats to your network - Use basic networking knowledge to improve security - Get inside the minds of hackers, so you can deter their attacks - Implement a proven layered approach to network security - Resist modern social engineering attacks - Defend against today's most common Denial of Service (DoS) attacks - Halt viruses, spyware, worms, Trojans, and other malware - Prevent problems arising from malfeasance or ignorance - Choose the best encryption methods for your organization - Compare security technologies, including the latest security appliances - Implement security policies that will work in your environment - Scan your network for vulnerabilities - Evaluate potential security consultants - Master basic computer forensics and know what to do if you're attacked - Learn how cyberterrorism and information warfare are evolving
LC Classification Number
QA76.9.A25E325 2016
Description de l'objet fournie par le vendeur
Informations sur le vendeur professionnel
À propos de ce vendeur
Texas Book Consignments
99,6% d'évaluations positives•48 000 objets vendus
Inscrit comme vendeur professionnel
Évaluations du vendeur (13.323)
- r***n (278)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéThe book was not delivered. I want an immediate full refund!!!
- v***v (463)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéHighly recommend!
- e***b (1652)- Évaluations laissées par l'acheteur.Dernier moisAchat vérifiéQuick shipping. Exactly as advertised