Matches in SemOpenAlex for { <https://semopenalex.org/work/W2763869132> ?p ?o ?g. }
Showing items 1 to 72 of
72
with 100 items per page.
- W2763869132 abstract "ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers todays latest attacks and countermeasures The perfect beginners guide for anyone interested in a computer security career Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned. Whether youre a student, a professional, or a manager, this guide will help you protect your assetsand expand your career options. Learn how to Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against todays most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if youre attacked Learn how cyberterrorism and information warfare are evolving" @default.
- W2763869132 created "2017-10-20" @default.
- W2763869132 creator A5018410118 @default.
- W2763869132 date "2016-06-23" @default.
- W2763869132 modified "2023-09-26" @default.
- W2763869132 title "Computer Security Fundamentals (3rd Edition)" @default.
- W2763869132 hasPublicationYear "2016" @default.
- W2763869132 type Work @default.
- W2763869132 sameAs 2763869132 @default.
- W2763869132 citedByCount "1" @default.
- W2763869132 countsByYear W27638691322019 @default.
- W2763869132 crossrefType "book" @default.
- W2763869132 hasAuthorship W2763869132A5018410118 @default.
- W2763869132 hasConcept C108827166 @default.
- W2763869132 hasConcept C109297577 @default.
- W2763869132 hasConcept C110875604 @default.
- W2763869132 hasConcept C111472728 @default.
- W2763869132 hasConcept C127413603 @default.
- W2763869132 hasConcept C136764020 @default.
- W2763869132 hasConcept C138885662 @default.
- W2763869132 hasConcept C182590292 @default.
- W2763869132 hasConcept C2778732403 @default.
- W2763869132 hasConcept C38652104 @default.
- W2763869132 hasConcept C38822068 @default.
- W2763869132 hasConcept C41008148 @default.
- W2763869132 hasConcept C41895202 @default.
- W2763869132 hasConcept C541664917 @default.
- W2763869132 hasConcept C547195049 @default.
- W2763869132 hasConcept C86844869 @default.
- W2763869132 hasConceptScore W2763869132C108827166 @default.
- W2763869132 hasConceptScore W2763869132C109297577 @default.
- W2763869132 hasConceptScore W2763869132C110875604 @default.
- W2763869132 hasConceptScore W2763869132C111472728 @default.
- W2763869132 hasConceptScore W2763869132C127413603 @default.
- W2763869132 hasConceptScore W2763869132C136764020 @default.
- W2763869132 hasConceptScore W2763869132C138885662 @default.
- W2763869132 hasConceptScore W2763869132C182590292 @default.
- W2763869132 hasConceptScore W2763869132C2778732403 @default.
- W2763869132 hasConceptScore W2763869132C38652104 @default.
- W2763869132 hasConceptScore W2763869132C38822068 @default.
- W2763869132 hasConceptScore W2763869132C41008148 @default.
- W2763869132 hasConceptScore W2763869132C41895202 @default.
- W2763869132 hasConceptScore W2763869132C541664917 @default.
- W2763869132 hasConceptScore W2763869132C547195049 @default.
- W2763869132 hasConceptScore W2763869132C86844869 @default.
- W2763869132 hasLocation W27638691321 @default.
- W2763869132 hasOpenAccess W2763869132 @default.
- W2763869132 hasPrimaryLocation W27638691321 @default.
- W2763869132 hasRelatedWork W1536432326 @default.
- W2763869132 hasRelatedWork W1579371649 @default.
- W2763869132 hasRelatedWork W1579628784 @default.
- W2763869132 hasRelatedWork W1674075711 @default.
- W2763869132 hasRelatedWork W171601550 @default.
- W2763869132 hasRelatedWork W175833725 @default.
- W2763869132 hasRelatedWork W2215592675 @default.
- W2763869132 hasRelatedWork W2232470351 @default.
- W2763869132 hasRelatedWork W2240670278 @default.
- W2763869132 hasRelatedWork W2253673842 @default.
- W2763869132 hasRelatedWork W2503910438 @default.
- W2763869132 hasRelatedWork W2610672603 @default.
- W2763869132 hasRelatedWork W2738699531 @default.
- W2763869132 hasRelatedWork W2744281607 @default.
- W2763869132 hasRelatedWork W2749628855 @default.
- W2763869132 hasRelatedWork W2990238418 @default.
- W2763869132 hasRelatedWork W3193436436 @default.
- W2763869132 hasRelatedWork W36879828 @default.
- W2763869132 hasRelatedWork W565962854 @default.
- W2763869132 hasRelatedWork W626641102 @default.
- W2763869132 isParatext "false" @default.
- W2763869132 isRetracted "false" @default.
- W2763869132 magId "2763869132" @default.
- W2763869132 workType "book" @default.