Computer Security Fundamentals

Saved in:
Bibliographic Details
Main Author: Easttom, Chuck (Author)
Format: Book
Language:English
Published: © 2020 Pearson 2020
Edition:Fourth Edition
Series:Pearson IT cybersecurity curriculum
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :QA 76.9.A25 E27 2020

MARC

LEADER 00000nam a2200000 c 4500
001 94297
003 MY-KLNDU
005 20241220004041.0
008 230513 20202020xxu b 001 0 eng d
020 |a 978-0135774779 (pbk) 
039 9 |a 202312271117  |b hainim  |y 202305131537  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a QA 76.9.A25  |b E27 2020 
090 |a QA 76.9.A25  |b E27 2020 
100 1 |a Easttom, Chuck  |e author 
245 1 0 |a Computer Security Fundamentals  |c Dr.Chuck Easttom 
250 |a Fourth Edition 
264 1 |b Pearson  |c 2020 
264 4 |a © 2020 
300 |a xxvi, 485 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Pearson IT cybersecurity curriculum 
504 |a Includes bibliographical references and index 
505 0 |a Chapter 1: Introduction to Computer Security Chapter 2: Networks and the Internet Chapter 3: Cyber Stalking, Fraud, and Abuse Chapter 4: Denial of Service Attacks Chapter 5: Malware Chapter 6: Techniques Used by Hackers Chapter 7: Industrial Espionage in Cyberspace Chapter 8: Encryption Chapter 9: Computer Security Technology Chapter 10: Security Policies Chapter 11: Network Scanning and Vulnerability Scanning Chapter 12: Cyber Terrorism and Information Warfare Chapter 13: Cyber Detective Chapter 14: Introduction to Forensics Chapter 15: Cybersecurity Engineering Glossary Appendix A: Resources Appendix B: Answers to the Multiple Choice Questions. 
592 |a IN/016981  |b 07/09/2023  |c RM351.49  |h Innowawasan Sdn. Bhd 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
830 0 |a Pearson IT cybersecurity curriculum 
999 |a vtls000105461  |c 94297  |d 94297