Computer Security Fundamentals 3rd Edition PDF free download

Computer Security Fundamentals, 3rd Edition introduces the fundamental concepts of computer security, from the basics to advanced applications. With an emphasis on practical solutions and real-world examples, this book covers key topics such as threat modeling, secure software development techniques, cryptography, access control mechanisms, web and email security, operating system security, and more.

Ideal for those new to computer and network security, this fully revised text prepares you for the challenges you will face in the field and provides a solid foundation for further study.

Computer Security Fundamentals 3rd Edition PDF free download is a perfect Ebook to familiarize yourself with basic and intermediate college EBOOK lessons and training. If you have ever taking a course in college level , you will find Computer Security Fundamentals 3rd Edition PDF free download book very useful to complete understand all the topics covered inEBOOKS . And this book is available at the touch of a button at the stuvera website .What are you waiting for? Computer Security Fundamentals 3rd Edition PDF free download book  you need, now at your fingertips on stuvera site

ABOUT THE BOOK Computer Security Fundamentals 3rd Edition PDF Free Download

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today’s latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a computer security career

Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

Learn how to

·         Identify and prioritize potential threats to your network

·         Use basic networking knowledge to improve security

·         Get inside the minds of hackers, so you can deter their attacks

·         Implement a proven layered approach to network security

·         Resist modern social engineering attacks

·         Defend against today’s most common Denial of Service (DoS) attacks

·         Halt viruses, spyware, worms, Trojans, and other malware

·         Prevent problems arising from malfeasance or ignorance

·         Choose the best encryption methods for your organization

·         Compare security technologies, including the latest security appliances

·         Implement security policies that will work in your environment

·         Scan your network for vulnerabilities

·         Evaluate potential security consultants

·         Master basic computer forensics and know what to do if you’re attacked

·         Learn how cyberterrorism and information warfare are evolving

TABLE OF CONTENTS Computer Security Fundamentals 3rd Edition PDF Free Download

  1. About This E-Book
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Author
  7. About the Technical Reviewer
  8. Dedication
  9. Acknowledgments
  10. We Want to Hear from You!
  11. Reader Services
  12. Introduction
  13. Chapter 1. Introduction to Computer Security
  14. Introduction
  15. How Seriously Should You Take Threats to Network Security?
  16. Identifying Types of Threats
  17. Malware
  18. Compromising System Security
  19. DoS Attacks
  20. Web Attacks
  21. Session Hijacking
  22. Insider Threats
  23. DNS Poisoning
  24. New Attacks
  25. Assessing the Likelihood of an Attack on Your Network
  26. Basic Security Terminology
  27. Hacker Slang
  28. Professional Terms
  29. Concepts and Approaches
  30. How Do Legal Issues Impact Network Security?
  31. Online Security Resources
  32. CERT
  33. Microsoft Security Advisor
  34. F-Secure
  35. SANS Institute
  36. Summary
  37. Test Your Skills
  38. Multiple Choice Questions
  39. Exercises
  40. Projects
  41. Chapter 2. Networks and the Internet
  42. Introduction
  43. Network Basics
  44. The Physical Connection: Local Networks
  45. Faster Connection Speeds
  46. Data Transmission
  47. How the Internet Works
  48. IP Addresses
  49. CIDR
  50. Uniform Resource Locators
  51. What Is a Packet?
  52. Basic Communications
  53. History of the Internet
  54. Basic Network Utilities
  55. IPConfig
  56. Ping
  57. Tracert
  58. Netstat
  59. NSLookup
  60. Other Network Devices
  61. Advanced Network Communications Topics
  62. The OSI Model
  63. Media Access Control (MAC) Addresses
  64. Summary
  65. Test Your Skills
  66. Multiple Choice Questions
  67. Exercises
  68. Projects
  69. Chapter 3. Cyber Stalking, Fraud, and Abuse
  70. Introduction
  71. How Internet Fraud Works
  72. Investment Offers
  73. Auction Frauds
  74. Identity Theft
  75. Phishing
  76. Cyber Stalking
  77. Real Cyber Stalking Cases
  78. How to Evaluate Cyber Stalking
  79. Crimes Against Children
  80. Laws About Internet Fraud
  81. Protecting Yourself Against Cyber Crime
  82. Protecting Against Investment Fraud
  83. Protecting Against Identity Theft
  84. Secure Browser Settings
  85. Summary
  86. Test Your Skills
  87. Multiple Choice Questions
  88. Exercises
  89. Projects
  90. Chapter 4. Denial of Service Attacks
  91. Introduction
  92. DoS
  93. Illustrating an Attack
  94. Common Tools Used for DoS
  95. DoS Weaknesses
  96. Specific DoS Attacks
  97. Land Attack
  98. DDoS
  99. Summary
  100. Test Your Skills
  101. Multiple Choice Questions
  102. Exercises
  103. Projects
  104. Chapter 5. Malware
  105. Introduction
  106. Viruses
  107. How a Virus Spreads
  108. Types of Viruses
  109. Virus Examples
  110. Rombertik
  111. Gameover ZeuS
  112. CryptoLocker and CryptoWall
  113. FakeAV
  114. MacDefender
  115. Troj/Invo-Zip
  116. W32/Netsky-P
  117. The Sobig Virus
  118. The Mimail Virus
  119. The Bagle Virus
  120. A Nonvirus Virus
  121. Flame
  122. Rules for Avoiding Viruses
  123. Trojan Horses
  124. The Buffer-Overflow Attack
  125. The Sasser Virus/Buffer Overflow
  126. Spyware
  127. Legal Uses of Spyware
  128. How Is Spyware Delivered to a Target System?
  129. Obtaining Spyware Software
  130. Other Forms of Malware
  131. Rootkit
  132. Malicious Web-Based Code
  133. Logic Bombs
  134. Spam
  135. Advanced Persistent Threats
  136. Detecting and Eliminating Viruses and Spyware
  137. Antivirus Software
  138. Antispyware Software
  139. Remediation Steps
  140. Summary
  141. Test Your Skills
  142. Multiple Choice Questions
  143. Exercises
  144. Projects
  145. Chapter 6. Techniques Used by Hackers
  146. Introduction
  147. Basic Terminology
  148. The Reconnaissance Phase
  149. Passive Scanning Techniques
  150. Active Scanning Techniques
  151. Actual Attacks
  152. SQL Script Injection
  153. Cross-Site Scripting
  154. Password Cracking
  155. Malware Creation
  156. Windows Hacking Techniques
  157. Penetration Testing
  158. NIST 800-115
  159. National Security Agency Information Assessment Methodology
  160. PCI Penetration Testing Standard
  161. Summary
  162. Test Your Skills
  163. Multiple Choice Questions
  164. Exercises
  165. Projects
  166. Chapter 7. Industrial Espionage in Cyberspace
  167. Introduction
  168. What Is Industrial Espionage?
  169. Information as an Asset
  170. Real-World Examples of Industrial Espionage
  171. Example 1: Houston Astros
  172. Example 2: University Trade Secrets
  173. Example 3: VIA Technology
  174. Example 4: General Motors
  175. Example 5: Bloomberg, Inc.
  176. Example 6: Interactive Television Technologies, Inc.
  177. Trends in Industrial Espionage
  178. Industrial Espionage and You
  179. How Does Espionage Occur?
  180. Low-Tech Industrial Espionage
  181. Spyware Used in Industrial Espionage
  182. Steganography Used in Industrial Espionage
  183. Phone Taps and Bugs
  184. Protecting Against Industrial Espionage
  185. Industrial Espionage Act
  186. Spear Phishing
  187. Summary
  188. Test Your Skills
  189. Multiple Choice Questions
  190. Exercises
  191. Projects
  192. Chapter 8. Encryption
  193. Introduction
  194. Cryptography Basics
  195. History of Encryption
  196. The Caesar Cipher
  197. Atbash
  198. Multi-Alphabet Substitution
  199. Rail Fence
  200. Enigma
  201. Binary Operations
  202. Modern Methods
  203. Single-Key (Symmetric) Encryption
  204. Modification of Symmetric Methods
  205. Public Key (Asymmetric) Encryption
  206. RSA
  207. Diffie-Hellman
  208. Elliptic Curve
  209. PGP
  210. Legitimate Versus Fraudulent Encryption Methods
  211. Digital Signatures
  212. Hashing
  213. MD5
  214. SHA
  215. RipeMD
  216. MAC and HMAC
  217. Rainbow Tables
  218. Steganography
  219. Historical Steganography
  220. Methods and Tools
  221. Cryptanalysis
  222. Frequency Analysis
  223. Modern Methods
  224. Cryptography Used on the Internet
  225. Summary
  226. Test Your Skills
  227. Multiple Choice Questions
  228. Exercises
  229. Projects
  230. Chapter 9. Computer Security Technology
  231. Introduction
  232. Virus Scanners
  233. How Does a Virus Scanner Work?
  234. Virus-Scanning Techniques
  235. Commercial Antivirus Software
  236. Firewalls
  237. Benefits and Limitation of Firewalls
  238. Firewall Types and Components
  239. Firewall Configurations
  240. Commercial and Free Firewall Products
  241. Firewall Logs
  242. Antispyware
  243. IDS
  244. IDS Categorization
  245. Identifying an Intrusion
  246. IDS Elements
  247. Snort
  248. Honey Pots
  249. Database Activity Monitoring
  250. Other Preemptive Techniques
  251. Authentication
  252. Digital Certificates
  253. SSL/TLS
  254. Virtual Private Networks
  255. Point-to-Point Tunneling Protocol
  256. Layer 2 Tunneling Protocol
  257. IPsec
  258. Wi-Fi Security
  259. Wired Equivalent Privacy
  260. Wi-Fi Protected Access
  261. WPA2
  262. Summary
  263. Test Your Skills
  264. Multiple Choice Questions
  265. Exercises
  266. Projects
  267. Chapter 10. Security Policies
  268. Introduction
  269. What Is a Policy?
  270. Defining User Policies
  271. Passwords
  272. Internet Use
  273. Email Usage
  274. Installing/Uninstalling Software
  275. Instant Messaging
  276. Desktop Configuration
  277. Bring Your Own Device
  278. Final Thoughts on User Policies
  279. Defining System Administration Policies
  280. New Employees
  281. Departing Employees
  282. Change Requests
  283. Security Breaches
  284. Virus Infection
  285. DoS Attacks
  286. Intrusion by a Hacker
  287. Defining Access Control
  288. Developmental Policies
  289. Standards, Guidelines, and Procedures
  290. Data Classification
  291. DoD Clearances
  292. Disaster Recovery
  293. Disaster Recovery Plan
  294. Business Continuity Plan
  295. Impact Analysis?
  296. Fault Tolerance
  297. Important Laws
  298. HIPAA
  299. Sarbanes-Oxley
  300. Payment Card Industry Data Security Standards
  301. Summary
  302. Test Your Skills
  303. Multiple Choice Questions
  304. Exercises
  305. Projects
  306. Chapter 11. Network Scanning and Vulnerability Scanning
  307. Introduction
  308. Basics of Assessing a System
  309. Patch
  310. Ports
  311. Protect
  312. Policies
  313. Probe
  314. Physical
  315. Securing Computer Systems
  316. Securing an Individual Workstation
  317. Securing a Server
  318. Securing a Network
  319. Scanning Your Network
  320. MBSA
  321. NESSUS
  322. Getting Professional Help
  323. Summary
  324. Test Your Skills
  325. Multiple Choice Questions
  326. Exercises
  327. Projects
  328. Chapter 12. Cyber Terrorism and Information Warfare
  329. Introduction
  330. Actual Cases of Cyber Terrorism
  331. The Chinese Eagle Union
  332. China’s Advanced Persistent Threat
  333. India and Pakistan
  334. Russian Hackers
  335. Weapons of Cyber Warfare
  336. Stuxnet
  337. Flame
  338. StopGeorgia.ru Malware
  339. FinFisher
  340. BlackEnergy
  341. NSA ANT Catalog
  342. Economic Attacks
  343. Military Operations Attacks
  344. General Attacks
  345. Supervisory Control and Data Acquisitions (SCADA)
  346. Information Warfare
  347. Propaganda
  348. Information Control
  349. Disinformation
  350. Actual Cases
  351. Future Trends
  352. Positive Trends
  353. Negative Trends
  354. Defense Against Cyber Terrorism
  355. Terrorist Recruiting and Communication
  356. TOR and the Dark Web
  357. Summary
  358. Test Your Skills
  359. Multiple Choice Questions
  360. Exercises
  361. Projects
  362. Chapter 13. Cyber Detective
  363. Introduction
  364. General Searches
  365. Court Records and Criminal Checks
  366. Sex Offender Registries
  367. Civil Court Records
  368. Other Resources
  369. Usenet
  370. Summary
  371. Test Your Skills
  372. Multiple Choice Questions
  373. Exercises
  374. Projects
  375. Chapter 14. Introduction to Forensics
  376. Introduction
  377. General Guidelines
  378. Don’t Touch the Suspect Drive
  379. Image a Drive with Forensic Toolkit
  380. Can You Ever Conduct Forensics on a Live Machine?
  381. Document Trail
  382. Secure the Evidence
  383. Chain of Custody
  384. FBI Forensics Guidelines
  385. U.S. Secret Service Forensics Guidelines
  386. EU Evidence Gathering
  387. Scientific Working Group on Digital Evidence
  388. Locard’s Principle of Transference
  389. Tools
  390. Finding Evidence on the PC
  391. Finding Evidence in the Browser
  392. Finding Evidence in System Logs
  393. Windows Logs
  394. Linux Logs
  395. Getting Back Deleted Files
  396. Operating System Utilities
  397. Net Sessions
  398. Openfiles
  399. Fc
  400. Netstat
  401. The Windows Registry
  402. Specific Entries
  403. Mobile Forensics: Cell Phone Concepts
  404. Cell Concepts Module
  405. Cellular Networks
  406. iOS
  407. Android
  408. Windows
  409. What You Should Look For
  410. The Need for Forensic Certification
  411. Expert Witnesses
  412. Federal Rule 702
  413. Daubert
  414. Additional Types of Forensics
  415. Network Forensics
  416. Virtual Forensics
  417. Summary
  418. Test Your Skills
  419. Multiple Choice Questions
  420. Exercises
  421. Appendix A. Glossary
  422. Appendix B. Resources
  423. General Computer Crime and Cyber Terrorism
  424. General Knowledge
  425. Cyber Stalking
  426. Identity Theft
  427. Port Scanners and Sniffers
  428. Password Crackers
  429. Countermeasures
  430. Cyber Investigation Tools
  431. General Tools
  432. Virus Research
  433. Appendix C. Answers to the Multiple Choice Questions
  434. Chapter 1
  435. Chapter 2
  436. Chapter 3
  437. Chapter 4
  438. Chapter 5
  439. Chapter 6
  440. Chapter 7
  441. Chapter 8
  442. Chapter 9
  443. Chapter 10
  444. Chapter 11
  445. Chapter 12
  446. Chapter 13
  447. Chapter 14
  448. Index
  449. Code Snippets

Leave a Comment