Computer security fundamentals / Chuck Easttom.
Material type: TextPublisher: Indianapolis, Indiana : Pearson, [2019]Edition: 4th editionDescription: xviii, 485 pages : illustrations ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9780135774779; 9780789757463; 078975746XSubject(s): Computer security | Computer networks -- Security measures | Seguridad informática | Redes de computadoras -- Medidas de seguridad | Computer networks -- Security measures | Computer securityDDC classification: 005.8 EAS LOC classification: QA76.9.A25 | E325 2019Online resources: E-bookItem type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
BOOK | UNIMY PJ Library | 005.8 EAS (Browse shelf (Opens below)) | Available | 102808 | ||
BOOK | UNIMY PJ Library | 005.8 EAS (Browse shelf (Opens below)) | Available | 102807 | ||
BOOK | UNIMY PJ Library | 005.8 EAS (Browse shelf (Opens below)) | Available | 102809 |
Browsing UNIMY shelves, Shelving location: PJ Library Close shelf browser (Hides shelf browser)
005.8 DUL CompTIA security+ study guide : exam SYO-401 / | 005.8 DUL CompTIA security+ study guide : exam SYO-401 / | 005.8 DUL CompTIA security+ study guide : exam SYO-401 / | 005.8 EAS Computer security fundamentals / | 005.8 EAS Computer security fundamentals / | 005.8 EAS Computer security fundamentals / | 005.8 F727c Cryptography and network security |
Includes index.
Introduction to Computer Security -- Networks and the Internet -- Cyber Stalking, Fraud and Abuse -- Denial of Service Attacks -- Malware -- Techniques used by Hackers -- Industrial Espionage in Cyberspace -- Encryption -- Computer Security Software -- Security Policies -- Network Scanning and Vulnerability Scanning -- Cyber Terrorism and Information Warfare -- Cyber Detective -- Introduction to Forensics
There are no comments on this title.