|Eingestellt in Kategorie:

Computer Security Fundamentals-

Ursprünglicher Text
Computer Security Fundamentals
Texas Book Consignments
(12838)
Angemeldet als gewerblicher Verkäufer
US $6,81
Ca.EUR 5,86
Artikelzustand:
Gut
Ganz entspannt. Rückgaben akzeptiert.
Versand:
Kostenlos USPS Media MailTM.
Standort: Haltom City, Texas, USA
Lieferung:
Lieferung zwischen Do, 24. Jul und Di, 29. Jul nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:156026888214
Zuletzt aktualisiert am 20. Jul. 2025 17:22:02 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Release Year
2016
Book Title
Computer Security Fundamentals
ISBN
9780789757463

Über dieses Produkt

Product Identifiers

Publisher
Cisco Press
ISBN-10
078975746X
ISBN-13
9780789757463
eBay Product ID (ePID)
2309538733

Product Key Features

Number of Pages
448 Pages
Publication Name
Computer Security Fundamentals
Language
English
Publication Year
2016
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Type
Textbook
Author
William (Chuck) Easttom II
Subject Area
Computers
Series
Pearson It Cybersecurity Curriculum (Itcc) Ser.
Format
Trade Paperback

Dimensions

Item Height
1.2 in
Item Weight
25.2 Oz
Item Length
9 in
Item Width
7 in

Additional Product Features

Edition Number
3
Intended Audience
College Audience
LCCN
2016-940227
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction Chapter 1: Introduction to Computer Security Introduction How Seriously Should You Take Threats to Network Security? Identifying Types of Threats Malware Compromising System Security DoS Attacks Web Attacks Session Hijacking Insider Threats DNS Poisoning New Attacks Assessing the Likelihood of an Attack on Your Network Basic Security Terminology Hacker Slang Professional Terms Concepts and Approaches How Do Legal Issues Impact Network Security? Online Security Resources CERT Microsoft Security Advisor F-Secure SANS Institute Summary Test Your Skills Chapter 2: Networks and the Internet Introduction Network Basics The Physical Connection: Local Networks Faster Connection Speeds Data Transmission How the Internet Works IP Addresses CIDR Uniform Resource Locators What Is a Packet? Basic Communications History of the Internet Basic Network Utilities IPConfig Ping Tracert Netstat NSLookup Other Network Devices Advanced Network Communications Topics The OSI Model Media Access Control (MAC) Addresses Summary Test Your Skills Chapter 3: Cyber Stalking, Fraud, and Abuse Introduction How Internet Fraud Works Investment Offers Auction Frauds Identity Theft Phishing Cyber Stalking Real Cyber Stalking Cases How to Evaluate Cyber Stalking Crimes Against Children Laws About Internet Fraud Protecting Yourself Against Cyber Crime Protecting Against Investment Fraud Protecting Against Identity Theft Secure Browser Settings Summary Test Your Skills Chapter 4: Denial of Service Attacks Introduction DoS Illustrating an Attack Common Tools Used for DoS DoS Weaknesses Specific DoS Attacks Land Attack DDoS Summary Test Your Skills Chapter 5: Malware Introduction Viruses How a Virus Spreads Types of Viruses Virus Examples Rombertik Gameover ZeuS CryptoLocker and CryptoWall FakeAV MacDefender Troj/Invo-Zip W32/Netsky-P The Sobig Virus The Mimail Virus The Bagle Virus A Nonvirus Virus Flame Rules for Avoiding Viruses Trojan Horses The Buffer-Overflow Attack The Sasser Virus/Buffer Overflow Spyware Legal Uses of Spyware How Is Spyware Delivered to a Target System? Obtaining Spyware Software Other Forms of Malware Rootkit Malicious Web-Based Code Logic Bombs Spam Advanced Persistent Threats Detecting and Eliminating Viruses and Spyware Antivirus Software Antispyware Software Remediation Steps Summary Test Your Skills Chapter 6: Techniques Used by Hackers Introduction Basic Terminology The Reconnaissance Phase Passive Scanning Techniques Active Scanning Techniques Actual Attacks SQL Script Injection Cross-Site Scripting Password Cracking Malware Creation Windows Hacking Techniques Penetration Testing NIST 800-115 National Security Agency Information Assessment Methodology PCI Penetration Testing Standard Summary Test Your Skills Chapter 7: Industrial Espionage in Cyberspace Introduction What Is Industrial Espionage? Information as an Asset Real-World Examples of Industrial Espionage Example 1: Houston Astros Example 2: University Trade Secrets Example 3: VIA Technology Example 4: General Motors Example 5: Bloomberg, Inc. Example 6: Interactive Television Technologies, Inc. Trends in Industrial Espionage Industrial Espionage and You How Does Espionage Occur? Low-Tech Industrial Espionage Spyware Used in Industrial Espionage Steganography Used in Industrial Espionage Phone Taps and Bugs Protecting Against Industrial Espionage Industrial Espionage Act Spear Phishing Summary Test Your Skills Chapter 8: Encryption Introduction Cryptography Basics History of Encryption The Caesar Cipher Atbash Multi-Alphabet Substitution Rail Fence Enigma <p style="margin:0px
Synopsis
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today's most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you're attacked · Learn how cyberterrorism and information warfare are evolving, ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. Whether you're a student, a professional, or a manager, this guide will help you protect your assets--and expand your career options. Learn how to - Identify and prioritize potential threats to your network - Use basic networking knowledge to improve security - Get inside the minds of hackers, so you can deter their attacks - Implement a proven layered approach to network security - Resist modern social engineering attacks - Defend against today's most common Denial of Service (DoS) attacks - Halt viruses, spyware, worms, Trojans, and other malware - Prevent problems arising from malfeasance or ignorance - Choose the best encryption methods for your organization - Compare security technologies, including the latest security appliances - Implement security policies that will work in your environment - Scan your network for vulnerabilities - Evaluate potential security consultants - Master basic computer forensics and know what to do if you're attacked - Learn how cyberterrorism and information warfare are evolving
LC Classification Number
QA76.9.A25E325 2016

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

Texas Book Consignments

99,6% positive Bewertungen47.692 Artikel verkauft

Mitglied seit Sep 2006
Antwortet meist innerhalb 24 Stunden
Angemeldet als gewerblicher Verkäufer
Our company is Aggie owned and operated since 2004. Our goal is to provide efficient and courteous service to our customers while maintaining honesty and integrity. We are grateful for everyone who ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (13.248)

Alle Bewertungen
Positiv
Neutral
Negativ
  • 1***1 (19)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    It's on me for not reading the description of this being an ex-library copy. I was expecting it to be, but that's completely my fault. The product is exactly as described, in good condition and of good quality. Shipping was fast. Appearance good, no pages ripped and cover is not bent. It was sent in a bag instead of a box, though, which could have led to damage in shipping. Overall I'm happy and would buy from this seller again.
  • b***g (911)- Bewertung vom Käufer.
    Letzter Monat
    Bestätigter Kauf
    Fantastic purchasing experience; sent as described as was the condition upon arrival; price and shipping (if any was charged) were reasonable. This author has been at the top of my list for quite a while as a favorite. This seller checks all the boxes!
  • t***l (2252)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Item arrived exactly as described and was extremely well packaged. I would Highly recommend and purchase from this seller again. Great seller communication. They are an asset to the eBay community!!