Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. "Computer Security Fundamentals," Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you've learned. Whether you're a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data "and expand your career options." Learn how toIdentify the worst threats to your network and assess your risksGet inside the minds of hackers, so you can prevent their attacksImplement a proven layered approach to network securityUse basic networking knowledge to improve securityResist the full spectrum of Internet-based scams and fraudsDefend against today's most common Denial of Service (DoS) attacksPrevent attacks by viruses, spyware, and other malwareProtect against low-tech social engineering attacksChoose the best encryption methods for your organizationSelect firewalls and other security technologiesImplement security policies that will work in your environmentScan your network for vulnerabilitiesEvaluate potential security consultantsUnderstand cyberterrorism and information warfareMaster basic computer forensics and know what to do after you're attacked
Chuck Easttom is an internationally renowned computer security expert and trainer. He has been in the IT industry for over 18 years and training for over 10. He has conducted numerous computer security courses over the past decade, most notably for the Secret Service Electronic Crimes Task Force. Students in his classes often include network administrators, corporate chief security officers (CSO’s), federal agents, local law enforcement, military personal, and department of defense contractors. He also has a master’s degree in education as well as a master’s of business administration (specialized in applied computer science) and has been named to both Who’s Who in Education and Whose Who in Science and Technology. He holds over 28 industry certifications including prominent computer security certifications such as CHFI, CISSP, ISSAP, and CEH. In addition to his many certifications he is a Microsoft Certified Trainer and an EC Council certified instructor.
He was part of the teams that created the CompTIA Security+ certification test, as well as their Server+ and Linux+ certification test. He was also part of the CEH version 8 job task analysis team. Chuck also created the EC Councils CAST 615 cryptography course as well as their new Certified Encryption Specialist certification course.
He is the author of 15 computer science books including two computer security textbooks from Pearson publishing that are used at universities around the world. He is also the author of a book specifically on computer crime from Cengage publishing, and most recently a computer forensics textbook from Jones and Barlett publishing.
Chuck has been a speaker on various computer security related topics including the following: the Harvard Computer Society (topic the history of computer crime), Columba University ACM Chapter (topic the history of computer viruses), Takedown con (multiple topics all related to cryptography), and Hacker Halted (topic cryptography), and the Southern Methodist University Computer Science and Engineering research colloquium (topic organized computer crime and terrorism).
A solid introduction to computer security basics covering topics ranging from hackers and frauds to security policies and computer forensics. This book is by no means comprehensive, but provides lots of very useful information to anyone looking for a start in computer security.
Each chapter ends with a series of self tests and exercises built to give the user further knowledge, and the book is full of links for further study and information. There are plenty of real world examples and best practices as well as baseline templates for security policies. A good start for anyone looking to begin learning about this field of study.