Hot Best Seller

Introduction to Computer Security

Availability: Ready to download

A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security books available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks atthe systems, technology, management, A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security books available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks atthe systems, technology, management, and policy side of security, and offers readers fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to readers of all levels. KEY TOPICS: Readers of this book will learn about common cyberattacks, including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. They will also learn about techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. Finally, they will study fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols. MARKET: Anyone interested in a very accessible introduction to computer security.


Compare

A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security books available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks atthe systems, technology, management, A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security books available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks atthe systems, technology, management, and policy side of security, and offers readers fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to readers of all levels. KEY TOPICS: Readers of this book will learn about common cyberattacks, including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. They will also learn about techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. Finally, they will study fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols. MARKET: Anyone interested in a very accessible introduction to computer security.

30 review for Introduction to Computer Security

  1. 4 out of 5

    Anjum Haz

    The textbook covers all naive topics of computer security nicely. Few topics weren't clear enough to understand. The textbook covers all naive topics of computer security nicely. Few topics weren't clear enough to understand.

  2. 5 out of 5

    Viet Nguyen

    A very good book with clear explanation. Nevertheless, you will not become a hacker/pentester after reading this for sure. Try all the exercises at https://pentesterlab.com. Of course, you will also not turn out to be a hacker/pentester after doing the exercises. However, at the end of the day, you will know what/where/how to search for the problem's solutions. A very good book with clear explanation. Nevertheless, you will not become a hacker/pentester after reading this for sure. Try all the exercises at https://pentesterlab.com. Of course, you will also not turn out to be a hacker/pentester after doing the exercises. However, at the end of the day, you will know what/where/how to search for the problem's solutions.

  3. 4 out of 5

    Bandar

  4. 4 out of 5

    Martin

  5. 5 out of 5

    Yong-Siang

  6. 5 out of 5

    Dongyu Xu

  7. 5 out of 5

    Taylor Blanton

  8. 4 out of 5

    Divya Gupta

  9. 5 out of 5

    Nad

  10. 5 out of 5

    Mary

  11. 5 out of 5

    Cheyne Friend

  12. 5 out of 5

    Nate Ledford

  13. 5 out of 5

    Caleb

  14. 4 out of 5

    Paul Shen

  15. 4 out of 5

    Cheah Coco

  16. 4 out of 5

    Middlethought

  17. 5 out of 5

    Andrew S Weber

  18. 4 out of 5

    Diego Muniz

  19. 5 out of 5

    Mohammad

  20. 5 out of 5

    Lanssie Ma

  21. 5 out of 5

    Lorena

  22. 4 out of 5

    Jon Anders

  23. 4 out of 5

    Ctagoagmail.Com

  24. 4 out of 5

    Stephen

  25. 5 out of 5

    D

  26. 4 out of 5

    Jiaming Jiang

  27. 4 out of 5

    Lara

  28. 5 out of 5

    Fuad Abuzahra

  29. 5 out of 5

    Chitra Raj Narayanan

  30. 5 out of 5

    Khalid

Add a review

Your email address will not be published. Required fields are marked *

Loading...