NUML LIBRARY RAWALPINDI (National University of Modern Languages)

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Bookmark Share

Book

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

William Easttom II - Personal Name;

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today?s latest attacks and countermeasures

The perfect beginner?s guide for anyone interested in a computer security career

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you?ve learned.

Whether you?re a student, a professional, or a manager, this guide will help you protect your assets?and expand your career options.

LEARN HOW TO

Identify and prioritize potential threats to your network
Use basic networking knowledge to improve security
Get inside the minds of hackers, so you can deter their attacks
Implement a proven layered approach to network security
Resist modern social engineering attacks
Defend against today?s most common Denial of Service (DoS) attacks
Halt viruses, spyware, worms, Trojans, and other malware
Prevent problems arising from malfeasance or ignorance
Choose the best encryption methods for your organization
Compare security technologies, including the latest security appliances
Implement security policies that will work in your environment
Scan your network for vulnerabilities
Evaluate potential security consultants
Master basic computer forensics and know what to do if you?re attacked


Availability
#
Location name is not set Location name is not set
14211
Available
Detail Information
Series Title
-
Call Number
5.8
Publisher
Islamabad : Al Hafiz Traders., 2019
Collation
512
Language
English
ISBN/ISSN
978-0135774779
Classification
5.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
4th
Subject(s)
Computer Science Data Science
1. Computer Science 2. Software Engineering 3. Dat
Data Science Information Technology
Specific Detail Info
-
Statement of Responsibility
William Easttom II
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

NUML LIBRARY RAWALPINDI (National University of Modern Languages)
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2026 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?