Titre : |
Computer security fundamentals |
Type de document : |
texte imprimé |
Auteurs : |
Chuck Easttom, Auteur |
Mention d'édition : |
4th ed |
Editeur : |
Boston : Pearson |
Année de publication : |
2020 |
Importance : |
XXVI, 485 p. |
Présentation : |
ill. |
Format : |
24 cm |
ISBN/ISSN/EAN : |
978-0-13-577477-9 |
Note générale : |
Glossaire |
Langues : |
Anglais (eng) |
Mots-clés : |
Systèmes informatiques -- Mesures de sûreté
Réseaux d'ordinateurs -- Mesures de sûreté
Computer security
Computer networks -- Security measures |
Index. décimale : |
004.056 Sécurité |
Résumé : |
Clearly explains core concepts, terminology, challenges, technologies, and skills.
Covers today’s latest attacks and countermeasures. The perfect beginner’s guide for anyone interested in a computer security career.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned. |
Note de contenu : |
Summary :
1. Introduction to computer security.
2. Networks and the internet.
3. Cyber stalking, fraud, and abuse.
4. Denial of service attacks.
5. Malware.
6. Techniques used by hackers.
7. Industrial espionage in cyberspace.
8. Encryption. |
Computer security fundamentals [texte imprimé] / Chuck Easttom, Auteur . - 4th ed . - Boston : Pearson, 2020 . - XXVI, 485 p. : ill. ; 24 cm. ISBN : 978-0-13-577477-9 Glossaire Langues : Anglais ( eng)
Mots-clés : |
Systèmes informatiques -- Mesures de sûreté
Réseaux d'ordinateurs -- Mesures de sûreté
Computer security
Computer networks -- Security measures |
Index. décimale : |
004.056 Sécurité |
Résumé : |
Clearly explains core concepts, terminology, challenges, technologies, and skills.
Covers today’s latest attacks and countermeasures. The perfect beginner’s guide for anyone interested in a computer security career.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned. |
Note de contenu : |
Summary :
1. Introduction to computer security.
2. Networks and the internet.
3. Cyber stalking, fraud, and abuse.
4. Denial of service attacks.
5. Malware.
6. Techniques used by hackers.
7. Industrial espionage in cyberspace.
8. Encryption. |
|  |