One-volume coverage of all the core concepts, terminology, issues, and practical skills modern computer security professionals need to know * *The most up-to-date computer security concepts text on the market. *Strong coverage and comprehensive analysis of key attacks, including denial of service, malware, and viruses. *Covers oft-neglected subject areas such as cyberterrorism, computer fraud, and industrial espionage. *Contains end-of-chapter exercises, projects, review questions, and plenty of realworld tips. Computer Security Fundamentals, Second Edition is designed to be the ideal one volume gateway into the entire field of computer security. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to security. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as vulnerability assessment, virus attacks, buffer overflow, hacking, spyware, network defense, firewalls, VPNs, Intrusion Detection Systems, and passwords. Unlike many other authors, however, he also fully addresses more specialized issues, including cyber terrorism, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates. This edition has been extensively updated to address the latest issues and technologies, including cyberbullying/cyberstalking, session hijacking, steganography, and more. Its examples have been updated to reflect the current state-of-the-art in both attacks and defense. End-of-chapter exercises, projects, and review questions guide readers in applying the knowledge they've gained, and Easttom offers many tips that readers would otherwise have to discover through hard experience.
Author: William (Chuck) Easttom II
Publisher: Pearson IT Certification
Release Date: 2016-05-23
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. Computer Security Fundamentals, Third Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you’ve learned. Whether you’re a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options. Learn how to Identify the worst threats to your network and assess your risks Get inside the minds of hackers, so you can prevent their attacks Implement a proven layered approach to network security Use basic networking knowledge to improve security Resist the full spectrum of Internet-based scams and frauds Defend against today’s most common Denial of Service (DoS) attacks Prevent attacks by viruses, spyware, and other malware Protect against low-tech social engineering attacks Choose the best encryption methods for your organization Select firewalls and other security technologies Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Understand cyberterrorism and information warfare Master basic computer forensics and know what to do after you’re attacked
Reflecting the latest trends and developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, Fourth Edition, provides a complete introduction to practical network and computer security and maps to the CompTIA Security+ SY0-301 Certification Exam. The text covers the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The updated edition includes new topics, such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. The new edition features activities that link to the Information Security Community Site, which offers video lectures, podcats, discussion boards, additional hands-on activities and more to provide a wealth of resources and up-to-the minute information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Author: William Stallings
Publisher: Pearson Higher Ed
Release Date: 2015-01-26
Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008. Teaching and Learning Experience This program presents a better teaching and learning experience—for you and your students. It will help: Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective. Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security. Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material. Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.
Author: William (Chuck) Easttom II
Publisher: Pearson IT Certification
Release Date: 2013-10-18
Everything you need to know about modern network attacks and defense, in one book Clearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attacks and countermeasures The perfect beginner’s guide for anyone interested in a network security career ¿ Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments. ¿ Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense. From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism. ¿ If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks. ¿ Learn how to Understand essential network security concepts, challenges, and careers Learn how modern attacks work Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks Select the right security technologies for any network environment Use encryption to protect information Harden Windows and Linux systems and keep them patched Securely configure web browsers to resist attacks Defend against malware Define practical, enforceable security policies Use the “6 Ps” to assess technical and human aspects of system security Detect and fix system vulnerability Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula Ensure physical security and prepare for disaster recovery Know your enemy: learn basic hacking, and see how to counter it Understand standard forensic techniques and prepare for investigations of digital crime ¿
Author: Gert De Laet
Publisher: Cisco Press
Release Date: 2005
Written for those IT professionals who have some networking background but are new to the security field, this handbook is divided into three parts: first the basics, presenting terms and concepts; second, the two components of security--cryptography and security policies--and finally the various security components, such as router security, firewalls, remote access security, wireless security and VPNs. Original. (Intermediate)
Publisher: Jones & Bartlett Learning
Release Date: 2016-10-15
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification.
Author: Dieter Gollmann
Publisher: John Wiley & Sons
Release Date: 2011-02-28
This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
Author: Thomas R. Peltier
Publisher: CRC Press
Release Date: 2013-10-16
Genre: Business & Economics
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program. Includes ten new chapters Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements Expands its coverage of compliance and governance issues Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks Presents new information on mobile security issues Reorganizes the contents around ISO 27002 The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.
Publisher: Jones & Bartlett Learning
Release Date: 2017-08-30
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics.
Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative support for law enforcement, national security concerns, and information security consulting. This essential guide covers everything from effective communication to career guidance for the information security officer. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program. * Six new chapters present the latest information and resources to counter information security threats * Every chapter contains opening objectives and closing summaries to clarify key points * Accessible, easy-to-read style for the busy professional
Author: John R. Vacca
Publisher: Morgan Kaufmann
Release Date: 2017-05-10
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
Author: Bill Nelson
Publisher: Cengage Learning
Release Date: 2014-11-07
Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage and authoritative information from seasoned experts to deliver the most comprehensive forensics resource available. This proven author team's wide ranging areas of expertise mirror the breadth of coverage provided in the book, which focuses on techniques and practices for gathering and analyzing evidence used to solve crimes involving computers. Providing clear instruction on the tools and techniques of the trade, it introduces readers to every step of the computer forensics investigation-from lab set-up to testifying in court. It also details step-by-step guidance on how to use current forensics software. Appropriate for learners new to the field, it is also an excellent refresher and technology update for professionals in law enforcement, investigations, or computer security. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Author: Sari Greene
Publisher: Pearson IT Certification
Release Date: 2014-03-20
Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career ¿ In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them. Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. ¿ If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program. ¿ Learn how to ·¿¿¿¿¿¿¿¿ Establish program objectives, elements, domains, and governance ·¿¿¿¿¿¿¿¿ Understand policies, standards, procedures, guidelines, and plans—and the differences among them ·¿¿¿¿¿¿¿¿ Write policies in “plain language,” with the right level of detail ·¿¿¿¿¿¿¿¿ Apply the Confidentiality, Integrity & Availability (CIA) security model ·¿¿¿¿¿¿¿¿ Use NIST resources and ISO/IEC 27000-series standards ·¿¿¿¿¿¿¿¿ Align security with business strategy ·¿¿¿¿¿¿¿¿ Define, inventory, and classify your information and systems ·¿¿¿¿¿¿¿¿ Systematically identify, prioritize, and manage InfoSec risks ·¿¿¿¿¿¿¿¿ Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA) ·¿¿¿¿¿¿¿¿ Implement effective physical, environmental, communications, and operational security ·¿¿¿¿¿¿¿¿ Effectively manage access control ·¿¿¿¿¿¿¿¿ Secure the entire system development lifecycle ·¿¿¿¿¿¿¿¿ Respond to incidents and ensure continuity of operations ·¿¿¿¿¿¿¿¿ Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS ¿