Computer Security Fundamentals /

Includes bibliographical references and index.

Bibliographic Details
Main Author: Easttom, Chuck, author
Format:
Language:eng
Published: [Place of publication not identified] : Pearson, 2020
Subjects:
_version_ 1796761182379442176
author Easttom, Chuck, author
author_facet Easttom, Chuck, author
author_sort Easttom, Chuck, author
collection OCEAN
description Includes bibliographical references and index.
first_indexed 2024-03-05T16:22:30Z
format
id KOHA-OAI-TEST:557039
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:22:30Z
publishDate 2020
publisher [Place of publication not identified] : Pearson,
record_format dspace
spelling KOHA-OAI-TEST:5570392020-12-19T17:21:04ZComputer Security Fundamentals / Easttom, Chuck, author [Place of publication not identified] : Pearson,♭20202020engIncludes bibliographical references and index.Chapter 1: Introduction to Computer Security Chapter 2: Networks and the Internet Chapter 3: Cyber Stalking, Fraud, and Abuse Chapter 4: Denial of Service Attacks Chapter 5: Malware Chapter 6: Techniques Used by Hackers Chapter 7: Industrial Espionage in Cyberspace Chapter 8: Encryption Chapter 9: Computer Security Technology Chapter 10: Security Policies Chapter 11: Network Scanning and Vulnerability Scanning Chapter 12: Cyber Terrorism and Information Warfare Chapter 13: Cyber Detective Chapter 14: Introduction to Forensics Chapter 15: Cybersecurity Engineering Glossary Appendix A: Resources Appendix B: Answers to the Multiple Choice Questions.PSZJBLComputer networksComputer security URN:ISBN:9780135774779
spellingShingle Computer networks
Computer security
Easttom, Chuck, author
Computer Security Fundamentals /
title Computer Security Fundamentals /
title_full Computer Security Fundamentals /
title_fullStr Computer Security Fundamentals /
title_full_unstemmed Computer Security Fundamentals /
title_short Computer Security Fundamentals /
title_sort computer security fundamentals
topic Computer networks
Computer security
work_keys_str_mv AT easttomchuckauthor computersecurityfundamentals