Computer Security Fundamentals /
The perfect beginner's guide for anyone interested in a computer security career. Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, co...
Saved in:
| Main Author: | Easttom, Chuck (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
United States :
Pearson Education,
2023
|
| Edition: | Fifth Edition |
| Series: | Pearson IT Cybersecurity Curriculum
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
Computer and information security handbook
Published: (2009)
Published: (2009)
Computer and information security handbook
Published: (2013)
Published: (2013)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008)
by: Zou, Xukai, 1963-
Published: (2008)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Network defense and countermeasures principles and practices
by: Easttom, Chuck
Published: (2018)
by: Easttom, Chuck
Published: (2018)
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009)
by: Conti, Greg
Published: (2009)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
CompTIA Security+ 2008 in depth
by: Ciampa, Mark
Published: (2008)
by: Ciampa, Mark
Published: (2008)
Information security evaluation a holistic approach
by: Tashi, Igli
Published: (2011)
by: Tashi, Igli
Published: (2011)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
The craft system security
by: Smith 1964-
Published: (2007)
by: Smith 1964-
Published: (2007)
SECURITY TESTING MODEL FOR DETECTING SQL INJECTION VULNERABILITY IN WEB APPLICATION /
by: Nor Fatimah Awang
by: Nor Fatimah Awang
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2011)
by: Andress, Jason
Published: (2011)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Computer and information security
Published: (2016)
Published: (2016)
Insider threats
by: Arduin, Pierre-Emmanuel
Published: (2018)
by: Arduin, Pierre-Emmanuel
Published: (2018)
Security software development assessing and managing security risks
by: Ashbaugh
Published: (2009)
by: Ashbaugh
Published: (2009)
Network Security Fundamentals
Published: (2008)
Published: (2008)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Fundamentals of computer security
by: Pieprzyk, Josef 1949-
Published: (2003)
by: Pieprzyk, Josef 1949-
Published: (2003)
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Honeypots a new paradigm to information security
by: Joshi, R.C
Published: (2011)
by: Joshi, R.C
Published: (2011)
Similar Items
-
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020) -
Computer security principles and practice
by: Stallings, William
Published: (2008) -
Computer and information security handbook
Published: (2009) -
Computer and information security handbook
Published: (2013) -
Corporate computer and network security
by: Panko, R. R.
Published: (2010)


