دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [5 ed.]
نویسندگان: William Easttom
سری:
ISBN (شابک) : 0137984782, 9780137984787
ناشر: Pearson It Certification
سال نشر: 2022
تعداد صفحات:
زبان: English
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 24 Mb
در صورت تبدیل فایل کتاب Computer Security Fundamentals به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مبانی امنیت کامپیوتر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Page About This eBook Title Page Copyright Page Pearson’s Commitment to Diversity, Equity, and Inclusion Credits Contents at a Glance Table of Contents About the Author About the Technical Reviewer Dedication Page Acknowledgments We Want to Hear from You! Reader Services Introduction Chapter 1. Introduction to Computer Security Introduction How Seriously Should You Take Threats to Network Security? Identifying Types of Threats Assessing the Likelihood of an Attack on Your Network Basic Security Terminology Concepts and Approaches How Do Legal Issues Impact Network Security? Online Security Resources Summary Chapter 2. Networks and the Internet Introduction Network Basics How the Internet Works History of the Internet Basic Network Utilities Other Network Devices Advanced Network Communications Topics Cloud Computing Summary Chapter 3. Cyber Stalking, Fraud, and Abuse Introduction How Internet Fraud Works Identity Theft Cyber Stalking Protecting Yourself Against Cybercrime Summary Chapter 4. Denial of Service Attacks Introduction DoS Attacks Illustrating an Attack Common Tools Used for DoS Attacks DoS Weaknesses Specific DoS Attacks Real-World Examples of DoS Attacks How to Defend Against DoS Attacks Summary Chapter 5. Malware Introduction Viruses Trojan Horses The Buffer-Overflow Attack Spyware Other Forms of Malware Detecting and Eliminating Viruses and Spyware Summary Chapter 6. Techniques Used by Hackers Introduction Basic Terminology The Reconnaissance Phase Actual Attacks Malware Creation Penetration Testing The Dark Web Summary Chapter 7. Industrial Espionage in Cyberspace Introduction What Is Industrial Espionage? Information as an Asset Real-World Examples of Industrial Espionage How Does Espionage Occur? Protecting Against Industrial Espionage Trade Secrets The Industrial Espionage Act Spear Phishing Summary Chapter 8. Encryption Introduction Cryptography Basics History of Encryption Modern Cryptography Methods Public Key (Asymmetric) Encryption PGP Legitimate Versus Fraudulent Encryption Methods Digital Signatures Hashing MAC and HMAC Steganography Cryptanalysis Cryptography Used on the Internet Quantum Computing Cryptography Summary Chapter 9. Computer Security Technology Introduction Virus Scanners Firewalls Antispyware IDSs Digital Certificates SSL/TLS Virtual Private Networks Wi-Fi Security Summary Chapter 10. Security Policies Introduction What Is a Policy? Important Standards Defining User Policies Defining System Administration Policies Security Breaches Defining Access Control Development Policies Standards, Guidelines, and Procedures Disaster Recovery Zero Trust Important Laws Summary Chapter 11. Network Scanning and Vulnerability Scanning Introduction Basics of Assessing a System Securing Computer Systems Scanning Your Network Testing and Scanning Standards Getting Professional Help Summary Chapter 12. Cyber Terrorism and Information Warfare Introduction Actual Cases of Cyber Terrorism Weapons of Cyber Warfare Economic Attacks Military Operations Attacks General Attacks Supervisory Control and Data Acquisitions (SCADA) Information Warfare Actual Cases of Cyber Terrorism Future Trends Defense Against Cyber Terrorism Terrorist Recruiting and Communication TOR and the Dark Web Summary Chapter 13. Cyber Detective Introduction General Searches Company Searches Court Records and Criminal Checks Usenet Google Maltego Summary Chapter 14. Introduction to Forensics Introduction General Guidelines Finding Evidence on a PC Finding Evidence in System Logs Getting Back Deleted Files Operating System Utilities The Windows Registry Mobile Forensics: Cell Phone Concepts The Need for Forensic Certification Expert Witnesses Additional Types of Forensics Summary Chapter 15. Cybersecurity Engineering Introduction Defining Cybersecurity Engineering Standards SecML Modeling Summary Glossary Appendix A: Resources General Computer Crime and Cyber Terrorism General Knowledge Cyber Stalking Identity Theft Port Scanners and Sniffers Password Crackers Countermeasures Cyber Investigation Tools General Tools Virus Research Appendix B: Answers to the Multiple Choice Questions Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Index