Welcome to Cheap2Price
    Sale!

    Computer Security Fundamentals

    $15.00

    Product details:

    • Product Format: PDF Format
    • Publisher ‏ : ‎ Pearson IT Certification; 3rd edition (June 28, 2016)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 447 pages

    ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY:

    Clearly explains core concepts, terminology, challenges, technologies, and skills

    Covers today&;s latest attacks and countermeasures

    The perfect beginner&;s guide for anyone interested in a computer security career

    Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

    Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

    This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.

    Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.

    Learn how to

    ·         Identify and prioritize potential threats to your network

    ·         Use basic networking knowledge to improve security

    ·         Get inside the minds of hackers, so you can deter their attacks

    ·         Implement a proven layered approach to network security

    ·         Resist modern social engineering attacks

    ·         Defend against today&;s most common Denial of Service (DoS) attacks

    ·         Halt viruses, spyware, worms, Trojans, and other malware

    ·         Prevent problems arising from malfeasance or ignorance

    ·         Choose the best encryption methods for your organization

    ·         Compare security technologies, including the latest security appliances

    ·         Implement security policies that will work in your environment

    ·         Scan your network for vulnerabilities

    ·         Evaluate potential security consultants

    ·         Master basic computer forensics and know what to do if you&;re attacked

    ·         Learn how cyberterrorism and information warfare are evolving

     

    Editorial Reviews:

    About the Author:

    Chuck Easttom has many years of practical experience in all aspects of IT. He holds a Doctor of Science in Cyber Security and 3 masters degrees(including 1 in applied computer science and 1 in systems engineering). He has authored 26 computer science books ( so far) and is an inventor with fifteen computer science patents, and numerous research papers on topics such as digital forensics, cyber warfare, engineering processes, cryptography, and other areas.
    He was a subject matter expert for CompTIA in the creation of their Security+, Linux+,and Server+certification tests and on the Job Task Analysis team for CEH v8. He created the OS Forensics certification test and course.  Hecurrently holds  over 40 IT certifications (A+,Network+, iNet+, Linux+,Server+,MCP, MCAD, MCSA, MCSE, MCDBA,MCTS,MCITP, CEH, CHFI, CISSP, CCFP, ISSAP,and more).

    Dr. Easttom is frequently a speaker on computer science related topics, often specifically on computer security and related subjects. In the past he has been a speaker at: Hacker Halted, Takedown on, Secure World, ISC2 Security Congress, Harvard Computer Society, Columbia University ACM chapter, University of Texas at Dallas ACM Chapter, Southern Methodist University Research Colloquium, Hakon India, Defcon, Enfuse, to name a few. He has spoken on the history of viruses, cryptographic back doors, cryptanalysis, cyberwarfare and terrorism,  the details  of the cryptographic algorithms, quantum computing, engineering processes,  forensic report writing, and other computer science and security topics.  He is also a Distinguished Speaker of the ACM, as well as a member of the ACMand INCOSE and a Senior Member of the IEEE.

    Reviews

    There are no reviews yet.

    Only logged in customers who have purchased this product may leave a review.

    Vendor Information

    • Sale!
      Rated 0 out of 5

      TECHNIC MAGIC MIST SETTING SPRAY

      $7.00

      Technic Magic Mist Setting Spray:

      Set your makeup in place with an added glow! Our Magic Mists help to set your make up whilst leave you with an illuminated, glowing complexion

      Shake well before use and hold 30cm away from the face and spray evenly.

      Choose from our three shades;

      Iridescent
      Rose Gold
      24K Gold

      Add to cart
    • Sale!
      Rated 0 out of 5

      Spy Camera Pen 32GB Memory

      $22.00

      Product Description

      • 1) Digital Camera Pen works as a 32GB USB drive.
      • 2) Dimensions: 15cm x 1.5cm x 1.5cm (L x W x Diameter).
      • 3) Digital Camera Pen Camcorder bolsters USB 2.0 and 1.0.
      • 4) Real time recording in AVI video organize.
      • 5) The 2GB Digital Camera Pen will catch an aggregate of around 2 to 3 hours of video.
      • 6) USB Plug and Play Compatible.
      • 7) Video record measure: > 500KB for every min.
      • 8) Built-in rechargeable lithium-particle battery.
      • 9) Adaptor sort: USB connector charging link.
      • 10) You can utilize the Digital Camera Pen as a voice recorder.
      • 11) The Digital Camera Pen contains the littlest stick gap camera influenced particularly for secret to utilize.
      • 12) Digital Camera Pen has a simple to utilize “one touch record” catch enabling you to record any confirmation momentarily.
      • Particulars: Item Parameters
      • Video Format :AVI
      • Video Encoding : M-JPEG
      • Video Resolution : 1280*960 VGA
      • Video Frame Rate : 30fps±1fps
      • Supporting System : Windows me/2000/xp/2003/vista, WIN7
      • Charging Voltage : DC-5V
      • Interface Type : Mini USB
      • Battery Type : High-limit lithium polymer
      • Bundle: 1X Spy Pen camera Recorder and 1X USB link
      Add to cart
    • Sale!
      Rated 0 out of 5

      Anti-Wrinkle Firming Day and Night Cream by Vollare – for 50+ Women – with Hyaluronic Acid, Snap-8 and Vitamin-E

      $11.00

      Product information:

      Add to cart
    • Sale!
      Rated 0 out of 5

      CompTIA Cybersecurity 2017

      $12.00

      Product details:

      Senior Acquisitions Editor: Kenyon Brown
      Development Editor: David Clark
      Technical Editor: Robin Abernathy
      Production Editor: Rebecca Anderson
      Copy Editor: Elizabeth Welch
      Editorial Manager: Mary Beth Wakefield
      Production Manager: Kathleen Wisor
      Executive Editor: Jim Minatel
      Book Designers: Judy Fung and Bill Gibson
      Proofreader: Kim Wimpsett
      Indexer: Ted Laux
      Project Coordinator, Cover: Brent Savage
      Cover Designer: Wiley
      Cover Image: ©Getty Images Inc./Jeremy Woodhouse
      Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
      Published simultaneously in Canada
      ISBN: 978-1-119-34897-9
      ISBN: 978-1-119-34991-4 (ebk.)
      ISBN: 978-1-119-34988-4 (ebk.)
      Manufactured in the United States of America

      Learning Objectives

      In this course, you will assess and respond to security threats and operate a systems and network security analysis platform you will…

      • Assess information security risk in computing and network environments.
      • Analyze reconnaissance threats to computing and network environments.
      • Analyze attacks on computing and network environments.
      • Analyze post-attack techniques on computing and network environments.
      • Implement a vulnerability management program.
      • Collect cybersecurity intelligence.
      • Analyze data collected from security and event logs.
      • Perform active analysis on assets and networks.
      • Respond to cybersecurity incidents.
      • Investigate cybersecurity incidents.
      • Address security issues with the organization’s technology architecture.
      Add to cart
    • Rated 0 out of 5

      Phasellus molestie id mi sit amet

      $66.00

      Morbi mattis ipsum sem, in gravida dolor venenatis vestibulum. Aenean laoreet, nisi in bibendum dictum, purus libero accumsan enim, id vehicula enim metus vitae ipsum. Maecenas nulla est, dictum quis augue ultrices, dictum rutrum enim. Aliquam erat volutpat.

      Add to cart
    • Sale! Managerial Accounting R.H. Garrison, E. W. Noreen & P. C. Brewer- Hill International Edition 13th
      Rated 0 out of 5

      Managerial Accounting R.H. Garrison, E. W. Noreen & P. C. Brewer- Hill International Edition 13th

      $6.00

      Product details

      • Publisher ‏ : ‎ McGraw-Hill/Irwin; 13th edition (July 17, 2009)
      • Language ‏ : ‎ English
      • ISBN-10 ‏ : ‎ 0077387880
      • ISBN-13 ‏ : ‎ 978-0077387884
      • Item Weight ‏ : ‎ 4.4 pounds
      • Dimensions ‏ : ‎ 9 x 1.1 x 11 inches

      As the long-time best-seller, Garrison has helped guide close to 3 million students through managerial accounting since it was first published. It identifies the three functions managers must perform within their organizations—plan operations, control activities, and make decisions—and explains what accounting information is necessary for these functions, how to collect it, and how to interpret it. Garrison’s Managerial Accounting, is known for its accuracy and rigor. It is also unique in that the authors write the most important supplements that accompany the book: solutions manual, test bank, instructor’s manual, and study guide.

      Add to cart
    ×
    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Image
    • SKU
    • Rating
    • Price
    • Stock
    • Availability
    • Add to cart
    • Description
    • Content
    • Weight
    • Dimensions
    • Additional information
    • Attributes
    • Custom attributes
    • Custom fields
    Click outside to hide the compare bar
    Compare
    Wishlist 0
    Open wishlist page Continue shopping