Vous en avez un à vendre ?

Fondamentaux de sécurité informatique

Texas Book Consignments
(12909)
Inscrit comme vendeur professionnel
6,99 USD
Environ5,99 EUR
État :
Bon état
Pas d'inquiétude ! Les retours sont acceptés.
Livraison :
Gratuit USPS Media MailTM.
Lieu où se trouve l'objet : Haltom City, Texas, États-Unis
Délai de livraison :
Estimé entre le sam. 9 août et le ven. 15 août à 94104
Les délais de livraison sont estimés au moyen de notre méthode exclusive basée sur la distance entre l'acheteur et le lieu où se trouve l'objet, le service de livraison sélectionné, l'historique des livraisons du vendeur et d'autres facteurs. Les délais de livraison peuvent varier, notamment pendant les périodes de pointe.
Retours :
Retour sous 30 jours. L'acheteur paie les frais de retour. Si vous utilisez un bordereau d'affranchissement eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
     Diners Club

Achetez en toute confiance

Vendeur Top Fiabilité
Garantie client eBay
Obtenez un remboursement si vous ne recevez pas l'objet que vous avez commandé. En savoir plusGarantie client eBay - la page s'ouvre dans une nouvelle fenêtre ou un nouvel onglet
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :156026888214
Dernière mise à jour le 06 août 2025 17:52:02 CEST. Afficher toutes les modificationsAfficher toutes les modifications

Caractéristiques de l'objet

État
Bon état: Livre ayant déjà été lu, mais qui est toujours en bon état. La couverture présente des ...
Release Year
2016
Book Title
Computer Security Fundamentals
ISBN
9780789757463

À propos de ce produit

Product Identifiers

Publisher
Cisco Press
ISBN-10
078975746X
ISBN-13
9780789757463
eBay Product ID (ePID)
2309538733

Product Key Features

Number of Pages
448 Pages
Publication Name
Computer Security Fundamentals
Language
English
Publication Year
2016
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Type
Textbook
Author
William (Chuck) Easttom II
Subject Area
Computers
Series
Pearson It Cybersecurity Curriculum (Itcc) Ser.
Format
Trade Paperback

Dimensions

Item Height
1.2 in
Item Weight
25.2 Oz
Item Length
9 in
Item Width
7 in

Additional Product Features

Edition Number
3
Intended Audience
College Audience
LCCN
2016-940227
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction Chapter 1: Introduction to Computer Security Introduction How Seriously Should You Take Threats to Network Security? Identifying Types of Threats Malware Compromising System Security DoS Attacks Web Attacks Session Hijacking Insider Threats DNS Poisoning New Attacks Assessing the Likelihood of an Attack on Your Network Basic Security Terminology Hacker Slang Professional Terms Concepts and Approaches How Do Legal Issues Impact Network Security? Online Security Resources CERT Microsoft Security Advisor F-Secure SANS Institute Summary Test Your Skills Chapter 2: Networks and the Internet Introduction Network Basics The Physical Connection: Local Networks Faster Connection Speeds Data Transmission How the Internet Works IP Addresses CIDR Uniform Resource Locators What Is a Packet? Basic Communications History of the Internet Basic Network Utilities IPConfig Ping Tracert Netstat NSLookup Other Network Devices Advanced Network Communications Topics The OSI Model Media Access Control (MAC) Addresses Summary Test Your Skills Chapter 3: Cyber Stalking, Fraud, and Abuse Introduction How Internet Fraud Works Investment Offers Auction Frauds Identity Theft Phishing Cyber Stalking Real Cyber Stalking Cases How to Evaluate Cyber Stalking Crimes Against Children Laws About Internet Fraud Protecting Yourself Against Cyber Crime Protecting Against Investment Fraud Protecting Against Identity Theft Secure Browser Settings Summary Test Your Skills Chapter 4: Denial of Service Attacks Introduction DoS Illustrating an Attack Common Tools Used for DoS DoS Weaknesses Specific DoS Attacks Land Attack DDoS Summary Test Your Skills Chapter 5: Malware Introduction Viruses How a Virus Spreads Types of Viruses Virus Examples Rombertik Gameover ZeuS CryptoLocker and CryptoWall FakeAV MacDefender Troj/Invo-Zip W32/Netsky-P The Sobig Virus The Mimail Virus The Bagle Virus A Nonvirus Virus Flame Rules for Avoiding Viruses Trojan Horses The Buffer-Overflow Attack The Sasser Virus/Buffer Overflow Spyware Legal Uses of Spyware How Is Spyware Delivered to a Target System? Obtaining Spyware Software Other Forms of Malware Rootkit Malicious Web-Based Code Logic Bombs Spam Advanced Persistent Threats Detecting and Eliminating Viruses and Spyware Antivirus Software Antispyware Software Remediation Steps Summary Test Your Skills Chapter 6: Techniques Used by Hackers Introduction Basic Terminology The Reconnaissance Phase Passive Scanning Techniques Active Scanning Techniques Actual Attacks SQL Script Injection Cross-Site Scripting Password Cracking Malware Creation Windows Hacking Techniques Penetration Testing NIST 800-115 National Security Agency Information Assessment Methodology PCI Penetration Testing Standard Summary Test Your Skills Chapter 7: Industrial Espionage in Cyberspace Introduction What Is Industrial Espionage? Information as an Asset Real-World Examples of Industrial Espionage Example 1: Houston Astros Example 2: University Trade Secrets Example 3: VIA Technology Example 4: General Motors Example 5: Bloomberg, Inc. Example 6: Interactive Television Technologies, Inc. Trends in Industrial Espionage Industrial Espionage and You How Does Espionage Occur? Low-Tech Industrial Espionage Spyware Used in Industrial Espionage Steganography Used in Industrial Espionage Phone Taps and Bugs Protecting Against Industrial Espionage Industrial Espionage Act Spear Phishing Summary Test Your Skills Chapter 8: Encryption Introduction Cryptography Basics History of Encryption The Caesar Cipher Atbash Multi-Alphabet Substitution Rail Fence Enigma <p style="margin:0px
Synopsis
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today's most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you're attacked · Learn how cyberterrorism and information warfare are evolving, ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to - Identify and prioritize potential threats to your network - Use basic networking knowledge to improve security - Get inside the minds of hackers, so you can deter their attacks - Implement a proven layered approach to network security - Resist modern social engineering attacks - Defend against today's most common Denial of Service (DoS) attacks - Halt viruses, spyware, worms, Trojans, and other malware - Prevent problems arising from malfeasance or ignorance - Choose the best encryption methods for your organization - Compare security technologies, including the latest security appliances - Implement security policies that will work in your environment - Scan your network for vulnerabilities - Evaluate potential security consultants - Master basic computer forensics and know what to do if you're attacked - Learn how cyberterrorism and information warfare are evolving
LC Classification Number
QA76.9.A25E325 2016

Description de l'objet fournie par le vendeur

Informations sur le vendeur professionnel

Je certifie que toutes mes activités de vente seront conformes à toutes les lois et réglementations de l'UE.
À propos de ce vendeur

Texas Book Consignments

99,6% d'évaluations positives48 000 objets vendus

Membre depuis sept. 2006
Répond en général sous 24 heures
Inscrit comme vendeur professionnel
Our company is Aggie owned and operated since 2004. Our goal is to provide efficient and courteous service to our customers while maintaining honesty and integrity. We are grateful for everyone who ...
Plus
Visiter la BoutiqueContacter

Évaluations détaillées du vendeur

Moyenne pour les 12 derniers mois
Description exacte
4.9
Frais de livraison raisonnables
5.0
Livraison rapide
5.0
Communication
5.0

Évaluations du vendeur (13.323)

Toutes les évaluations
Positives
Neutres
Négatives