Computer Security Fundamentals has 15 ratings and 2 reviews. Rachel said: Very basic text for non-IT types to get an idea what goes on underneath the hoo. Computer Security Fundamentals (3rd Edition) computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology. Computer Security Fundamentals, Third Edition 1 Introduction to Computer Security. Chuck Easttom is a computer security and forensics expert. He has .
|Published (Last):||19 May 2009|
|PDF File Size:||12.16 Mb|
|ePub File Size:||18.84 Mb|
|Price:||Free* [*Free Regsitration Required]|
What are the vulnerabilities? Updated for the many technology changes that have happened since this book first published in Share a link to All Resources.
Computer Security Fundamentals
How is personal information safeguarded? For system analysts network administrators, network security professionals and security audit professionals. In addition to this book, Chuck has authored 12 other titles on topics such as computer security, web development, programming, Linux, and computer crimeChuck also is a frequent guest speaker for computer groups, discussing computer securityYou can reach Chuck at his website www.
Published March 1st by Prentice Hall first published Franck added it Oct 20, Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking Networks and the Internet Ttp rated it did not like it Mar 21, Ben added it Jun 16, He is also the author of a book specifically on computer crime from Cengage publishing, and most recently a computer forensics textbook from Jones and Barlett publishing.
No trivia or quizzes yet. This book is by no means comprehensive, but provides lots of very useful information to anyone looking for a start in computer security. Heroes, villains, or delinquents? Registration Forgot your password? To ask other readers questions about Computer Security Fundamentalsplease sign up.
Chapter 1 Introduction to Computer Security 2 Chapter 1 Objectives Identify top threats to a computer network Assess the likelihood of an attack Define key terms like cracker, sneaker, firewall, and authentication Compare and contrast perimeter and layered approaches to network security Use online resources.
Jun 23, Wayne McCoy rated it liked it Shelves: This eBook requires no passwords or activation to read. All examples of cyber terrorism and infromation warfare will be updated to what is happening in Jan 07, Rachel Bayles rated it liked it Shelves: Chuck has been a speaker on various computer security related topics including the following: You have successfully signed eastfom and will be required to sign back in should you swcurity to download more resources.
There are plenty of real world examples and best practi A solid introduction to computer security basics covering topics ranging from hackers and frauds to security policies and computer forensics.
Computer Viruses are malicious software programs that damage computer program entering into the computer without. Return to Book Page.
Easttom & Easttom, Computer Security Fundamentals | Pearson
There are plenty of real world examples and best practices as well as baseline templates for security policies. Signed out You have successfully signed out and will be required to sign back in should you comouter to download more resources.
No reproduction or distribution without the prior written consent of McGraw-Hill Education. Account Options Sign in. A solid introduction to computer security basics covering topics ranging from hackers and frauds to security policies and computer fundammentals. Danielle Thompson added it Jan 26, Computer Security Fundamentals by Chuck Easttom.