One-volume coverage of all the core concepts, terminology, issues, and practical skills modern computer security professionals need to know * *The most up-to-date computer security concepts text on the market. *Strong coverage and comprehensive analysis of key attacks, including denial of service, malware, and viruses. *Covers oft-neglected subject areas such as cyberterrorism, computer fraud, and industrial espionage. *Contains end-of-chapter exercises, projects, review questions, and plenty of realworld tips. Computer Security Fundamentals, Second Edition is designed to be the ideal one volume gateway into the entire field of computer security. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to security. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as vulnerability assessment, virus attacks, buffer overflow, hacking, spyware, network defense, firewalls, VPNs, Intrusion Detection Systems, and passwords. Unlike many other authors, however, he also fully addresses more specialized issues, including cyber terrorism, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates. This edition has been extensively updated to address the latest issues and technologies, including cyberbullying/cyberstalking, session hijacking, steganography, and more. Its examples have been updated to reflect the current state-of-the-art in both attacks and defense. End-of-chapter exercises, projects, and review questions guide readers in applying the knowledge they've gained, and Easttom offers many tips that readers would otherwise have to discover through hard experience.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Prentice Hall版权所有
计算机网络
和美国西蒙与舒斯特国际出版公司合作出版
of widely separated networks , two “ half bridges ” are needed ( see Figures 14-6 and 14-7 , below ) . ... ( a ) Architecture tl , t8 User data t2 , t7 LLC - H User data t3 , t4 , 15 , to MAC - H LLC - H User data MAC - T ( b ) ...
The objective of this book is to provide an up-to-date survey of developments in computer security.
Internet and WWW 2: Internet Network Design, Implementation and Management
Companion CD-ROM The companion CD-ROM contains a test bank with over 200 practice questions and an electronic version of the text. This volume is part of the Exam Certification Guide Series from Cisco Press(r).
With link encryption, each vulnerable communications link is equipped on both ends with an encryption device.Thus,all traffic over all communications links is secured.Although this requires a lot of encryption devices in a large network ...