Computer Security Fundamentals /
Includes bibliographical references and index.
Main Author: | |
---|---|
Format: | |
Language: | eng |
Published: |
[Place of publication not identified] : Pearson,
2020
|
Subjects: |
_version_ | 1796761182379442176 |
---|---|
author | Easttom, Chuck, author |
author_facet | Easttom, Chuck, author |
author_sort | Easttom, Chuck, author |
collection | OCEAN |
description | Includes bibliographical references and index. |
first_indexed | 2024-03-05T16:22:30Z |
format | |
id | KOHA-OAI-TEST:557039 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:22:30Z |
publishDate | 2020 |
publisher | [Place of publication not identified] : Pearson, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5570392020-12-19T17:21:04ZComputer Security Fundamentals / Easttom, Chuck, author [Place of publication not identified] : Pearson,♭20202020engIncludes bibliographical references and index.Chapter 1: Introduction to Computer Security Chapter 2: Networks and the Internet Chapter 3: Cyber Stalking, Fraud, and Abuse Chapter 4: Denial of Service Attacks Chapter 5: Malware Chapter 6: Techniques Used by Hackers Chapter 7: Industrial Espionage in Cyberspace Chapter 8: Encryption Chapter 9: Computer Security Technology Chapter 10: Security Policies Chapter 11: Network Scanning and Vulnerability Scanning Chapter 12: Cyber Terrorism and Information Warfare Chapter 13: Cyber Detective Chapter 14: Introduction to Forensics Chapter 15: Cybersecurity Engineering Glossary Appendix A: Resources Appendix B: Answers to the Multiple Choice Questions.PSZJBLComputer networksComputer security URN:ISBN:9780135774779 |
spellingShingle | Computer networks Computer security Easttom, Chuck, author Computer Security Fundamentals / |
title | Computer Security Fundamentals / |
title_full | Computer Security Fundamentals / |
title_fullStr | Computer Security Fundamentals / |
title_full_unstemmed | Computer Security Fundamentals / |
title_short | Computer Security Fundamentals / |
title_sort | computer security fundamentals |
topic | Computer networks Computer security |
work_keys_str_mv | AT easttomchuckauthor computersecurityfundamentals |