搜索
人大经济论坛 附件下载

附件下载

所在主题:
文件名:  Computer Security Fundamentals.pdf
资料下载链接地址: https://bbs.pinggu.org/a-2130206.html
附件大小:
如果喜欢该文档,欢迎订阅【2016新书】文库,https://bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3187

图书名称:Computer Security Fundamentals (3rd Edition)

作者:William (Chuck) Easttom II

出版社:
Pearson IT Certification
页数:447
出版时间:2016

语言:English

格式:pdf
内容简介:

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY


Clearly explains core concepts, terminology, challenges, technologies, and skills


Covers today’s latest attacks and countermeasures


The perfect beginner’s guide for anyone interested in a computer security career


Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.


Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.


Learn how to

· Identify and prioritize potential threats to your network

· Use basic networking knowledge to improve security

· Get inside the minds of hackers, so you can deter their attacks

· Implement a proven layered approach to network security

· Resist modern social engineering attacks

· Defend against today’s most common Denial of Service (DoS) attacks

· Halt viruses, spyware, worms, Trojans, and other malware

· Prevent problems arising from malfeasance or ignorance

· Choose the best encryption methods for your organization

· Compare security technologies, including the latest security appliances

· Implement security policies that will work in your environment

· Scan your network for vulnerabilities

· Evaluate potential security consultants

· Master basic computer forensics and know what to do if you’re attacked

· Learn how cyberterrorism and information warfare are evolving


回复免费:
[hide][/hide]




    熟悉论坛请点击新手指南
下载说明
1、论坛支持迅雷和网际快车等p2p多线程软件下载,请在上面选择下载通道单击右健下载即可。
2、论坛会定期自动批量更新下载地址,所以请不要浪费时间盗链论坛资源,盗链地址会很快失效。
3、本站为非盈利性质的学术交流网站,鼓励和保护原创作品,拒绝未经版权人许可的上传行为。本站如接到版权人发出的合格侵权通知,将积极的采取必要措施;同时,本站也将在技术手段和能力范围内,履行版权保护的注意义务。
(如有侵权,欢迎举报)
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

GMT+8, 2026-1-10 01:18