|In vendita nella categoria:
Ne hai uno da vendere?

Computer Security Fundamentals

Texas Book Consignments
(12842)
Registrato come venditore professionale
US $6,79
CircaEUR 5,84
Condizione:
Buone condizioni
Goditi i vantaggi. Restituzioni accettate.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: Haltom City, Texas, Stati Uniti
Consegna:
Consegna prevista tra il ven 25 lug e il gio 31 lug a 94104
I tempi di consegna previsti utilizzando il metodo proprietario di eBay, che è basato sulla vicinanza dell'acquirente rispetto al luogo in cui si trova l'oggetto, sul servizio di spedizione selezionato, sulla cronologia di spedizione del venditore e su altri fattori. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Scopri di piùGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:156026888214
Ultimo aggiornamento: 21 lug 2025 18:01:20 CESTVedi tutte le revisioniVedi tutte le revisioni

Specifiche dell'oggetto

Condizione
Buone condizioni: Libro che è già stato letto ma è in buone condizioni. Mostra piccolissimi danni ...
Release Year
2016
Book Title
Computer Security Fundamentals
ISBN
9780789757463

Informazioni su questo prodotto

Product Identifiers

Publisher
Cisco Press
ISBN-10
078975746X
ISBN-13
9780789757463
eBay Product ID (ePID)
2309538733

Product Key Features

Number of Pages
448 Pages
Publication Name
Computer Security Fundamentals
Language
English
Publication Year
2016
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Type
Textbook
Author
William (Chuck) Easttom II
Subject Area
Computers
Series
Pearson It Cybersecurity Curriculum (Itcc) Ser.
Format
Trade Paperback

Dimensions

Item Height
1.2 in
Item Weight
25.2 Oz
Item Length
9 in
Item Width
7 in

Additional Product Features

Edition Number
3
Intended Audience
College Audience
LCCN
2016-940227
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction Chapter 1: Introduction to Computer Security Introduction How Seriously Should You Take Threats to Network Security? Identifying Types of Threats Malware Compromising System Security DoS Attacks Web Attacks Session Hijacking Insider Threats DNS Poisoning New Attacks Assessing the Likelihood of an Attack on Your Network Basic Security Terminology Hacker Slang Professional Terms Concepts and Approaches How Do Legal Issues Impact Network Security? Online Security Resources CERT Microsoft Security Advisor F-Secure SANS Institute Summary Test Your Skills Chapter 2: Networks and the Internet Introduction Network Basics The Physical Connection: Local Networks Faster Connection Speeds Data Transmission How the Internet Works IP Addresses CIDR Uniform Resource Locators What Is a Packet? Basic Communications History of the Internet Basic Network Utilities IPConfig Ping Tracert Netstat NSLookup Other Network Devices Advanced Network Communications Topics The OSI Model Media Access Control (MAC) Addresses Summary Test Your Skills Chapter 3: Cyber Stalking, Fraud, and Abuse Introduction How Internet Fraud Works Investment Offers Auction Frauds Identity Theft Phishing Cyber Stalking Real Cyber Stalking Cases How to Evaluate Cyber Stalking Crimes Against Children Laws About Internet Fraud Protecting Yourself Against Cyber Crime Protecting Against Investment Fraud Protecting Against Identity Theft Secure Browser Settings Summary Test Your Skills Chapter 4: Denial of Service Attacks Introduction DoS Illustrating an Attack Common Tools Used for DoS DoS Weaknesses Specific DoS Attacks Land Attack DDoS Summary Test Your Skills Chapter 5: Malware Introduction Viruses How a Virus Spreads Types of Viruses Virus Examples Rombertik Gameover ZeuS CryptoLocker and CryptoWall FakeAV MacDefender Troj/Invo-Zip W32/Netsky-P The Sobig Virus The Mimail Virus The Bagle Virus A Nonvirus Virus Flame Rules for Avoiding Viruses Trojan Horses The Buffer-Overflow Attack The Sasser Virus/Buffer Overflow Spyware Legal Uses of Spyware How Is Spyware Delivered to a Target System? Obtaining Spyware Software Other Forms of Malware Rootkit Malicious Web-Based Code Logic Bombs Spam Advanced Persistent Threats Detecting and Eliminating Viruses and Spyware Antivirus Software Antispyware Software Remediation Steps Summary Test Your Skills Chapter 6: Techniques Used by Hackers Introduction Basic Terminology The Reconnaissance Phase Passive Scanning Techniques Active Scanning Techniques Actual Attacks SQL Script Injection Cross-Site Scripting Password Cracking Malware Creation Windows Hacking Techniques Penetration Testing NIST 800-115 National Security Agency Information Assessment Methodology PCI Penetration Testing Standard Summary Test Your Skills Chapter 7: Industrial Espionage in Cyberspace Introduction What Is Industrial Espionage? Information as an Asset Real-World Examples of Industrial Espionage Example 1: Houston Astros Example 2: University Trade Secrets Example 3: VIA Technology Example 4: General Motors Example 5: Bloomberg, Inc. Example 6: Interactive Television Technologies, Inc. Trends in Industrial Espionage Industrial Espionage and You How Does Espionage Occur? Low-Tech Industrial Espionage Spyware Used in Industrial Espionage Steganography Used in Industrial Espionage Phone Taps and Bugs Protecting Against Industrial Espionage Industrial Espionage Act Spear Phishing Summary Test Your Skills Chapter 8: Encryption Introduction Cryptography Basics History of Encryption The Caesar Cipher Atbash Multi-Alphabet Substitution Rail Fence Enigma <p style="margin:0px
Synopsis
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today's most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you're attacked · Learn how cyberterrorism and information warfare are evolving, ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to - Identify and prioritize potential threats to your network - Use basic networking knowledge to improve security - Get inside the minds of hackers, so you can deter their attacks - Implement a proven layered approach to network security - Resist modern social engineering attacks - Defend against today's most common Denial of Service (DoS) attacks - Halt viruses, spyware, worms, Trojans, and other malware - Prevent problems arising from malfeasance or ignorance - Choose the best encryption methods for your organization - Compare security technologies, including the latest security appliances - Implement security policies that will work in your environment - Scan your network for vulnerabilities - Evaluate potential security consultants - Master basic computer forensics and know what to do if you're attacked - Learn how cyberterrorism and information warfare are evolving
LC Classification Number
QA76.9.A25E325 2016

Descrizione dell'oggetto fatta dal venditore

Informazioni sul venditore professionale

Certifico che tutte le mie attività di vendita saranno conformi alle leggi e ai regolamenti dell'Unione europea.
Informazioni su questo venditore

Texas Book Consignments

99,6% di Feedback positivi48 mila oggetti venduti

Su eBay da set 2006
In genere risponde entro 24 ore
Registrato come venditore professionale
Our company is Aggie owned and operated since 2004. Our goal is to provide efficient and courteous service to our customers while maintaining honesty and integrity. We are grateful for everyone who ...
Mostra altro

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
4.9
Spese spedizione
5.0
Tempi di spedizione
5.0
Comunicazione
5.0

Feedback sul venditore (13.251)

Tutti i punteggi
Positivo
Neutro
Negativo
  • 1***1 (19)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    It's on me for not reading the description of this being an ex-library copy. I was expecting it to be, but that's completely my fault. The product is exactly as described, in good condition and of good quality. Shipping was fast. Appearance good, no pages ripped and cover is not bent. It was sent in a bag instead of a box, though, which could have led to damage in shipping. Overall I'm happy and would buy from this seller again.
  • b***g (914)- Feedback lasciato dall'acquirente.
    Mese scorso
    Acquisto verificato
    Fantastic purchasing experience; sent as described as was the condition upon arrival; price and shipping (if any was charged) were reasonable. This author has been at the top of my list for quite a while as a favorite. This seller checks all the boxes!
  • t***l (2252)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Item arrived exactly as described and was extremely well packaged. I would Highly recommend and purchase from this seller again. Great seller communication. They are an asset to the eBay community!!