|
Showing 1 - 5 of
5 matches in All Departments
This expanded textbook, now in its second edition, is a practical
yet in depth guide to cryptography and its principles and
practices. Now featuring a new section on quantum resistant
cryptography in addition to expanded and revised content
throughout, the book continues to place cryptography in real-world
security situations using the hands-on information contained
throughout the chapters. Prolific author Dr. Chuck Easttom lays out
essential math skills and fully explains how to implement
cryptographic algorithms in today's data protection landscape.
Readers learn and test out how to use ciphers and hashes, generate
random keys, handle VPN and Wi-Fi security, and encrypt VoIP,
Email, and Web communications. The book also covers cryptanalysis,
steganography, and cryptographic backdoors and includes a
description of quantum computing and its impact on cryptography.
This book is meant for those without a strong mathematics
background with only just enough math to understand the algorithms
given. The book contains a slide presentation, questions and
answers, and exercises throughout. Presents new and updated
coverage of cryptography including new content on quantum resistant
cryptography; Covers the basic math needed for cryptography -
number theory, discrete math, and algebra (abstract and linear);
Includes a full suite of classroom materials including exercises,
Q&A, and examples.
This textbook is a practical yet in depth guide to cryptography and
its principles and practices. The book places cryptography in
real-world security situations using the hands-on information
contained throughout the chapters. Prolific author Dr. Chuck
Easttom lays out essential math skills and fully explains how to
implement cryptographic algorithms in today's data protection
landscape. Readers learn and test out how to use ciphers and
hashes, generate random keys, handle VPN and Wi-Fi security, and
encrypt VoIP, Email, and Web communications. The book also covers
cryptanalysis, steganography, and cryptographic backdoors and
includes a description of quantum computing and its impact on
cryptography. This book is meant for those without a strong
mathematics background _ only just enough math to understand the
algorithms given. The book contains a slide presentation, questions
and answers, and exercises throughout. Presents a comprehensive
coverage of cryptography in an approachable format; Covers the
basic math needed for cryptography _ number theory, discrete math,
and algebra (abstract and linear); Includes a full suite of
classroom materials including exercises, Q&A, and examples.
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core
concepts, terminology, challenges, technologies, and skills Covers
today's latest attacks and countermeasures The perfect beginner's
guide for anyone interested in a computer security career Dr. Chuck
Easttom brings together complete coverage of all basic concepts,
terminology, and issues, along with all the skills you need to get
started. Drawing on 30 years of experience as a security
instructor, consultant, and researcher, Easttom helps you take a
proactive, realistic approach to assessing threats and implementing
countermeasures. Writing clearly and simply, he addresses crucial
issues that many introductory security books ignore, while
addressing the realities of a world where billions of new devices
are Internet-connected. This guide covers web attacks, hacking,
spyware, network defense, security appliances, VPNs, password use,
and much more. Its many tips and examples refl ect new industry
trends and the state-of-the-art in both attacks and defense.
Exercises, projects, and review questions in every chapter help you
deepen your understanding and apply all you've learned. LEARN HOW
TO Identify and prioritize potential threats to your network Use
basic networking knowledge to improve security Get inside the minds
of hackers, so you can deter their attacks Implement a proven
layered approach to network security Resist modern social
engineering attacks Defend against today's most common Denial of
Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and
other malware Prevent problems arising from malfeasance or
ignorance Choose the best encryption methods for your organization
Compare security technologies, including the latest security
appliances Implement security policies that will work in your
environment Scan your network for vulnerabilities Evaluate
potential security consultants Master basic computer forensics and
know what to do if you're attacked Learn how cyberterrorism and
information warfare are evolving
The perfect introduction to pen testing for all IT professionals
and students * Clearly explains key concepts, terminology,
challenges, tools, and skills * Covers the latest penetration
testing standards from NSA, PCI, and NIST Welcome to today's most
useful and practical introduction to penetration testing. Chuck
Easttom brings together up-to-the-minute coverage of all the
concepts, terminology, challenges, and skills you'll need to be
effective. Drawing on decades of experience in cybersecurity and
related IT fields, Easttom integrates theory and practice, covering
the entire penetration testing life cycle from planning to
reporting. You'll gain practical experience through a
start-to-finish sample project relying on free open source tools.
Throughout, quizzes, projects, and review sections deepen your
understanding and help you apply what you've learned. Including
essential pen testing standards from NSA, PCI, and NIST,
Penetration Testing Fundamentals will help you protect your
assets-and expand your career options. LEARN HOW TO * Understand
what pen testing is and how it's used * Meet modern standards for
comprehensive and effective testing * Review cryptography
essentials every pen tester must know * Perform reconnaissance with
Nmap, Google searches, and ShodanHq * Use malware as part of your
pen testing toolkit * Test for vulnerabilities in Windows shares,
scripts, WMI, and the Registry * Pen test websites and web
communication * Recognize SQL injection and cross-site scripting
attacks * Scan for vulnerabilities with OWASP ZAP, Vega, Nessus,
and MBSA * Identify Linux vulnerabilities and password cracks * Use
Kali Linux for advanced pen testing * Apply general hacking
technique ssuch as fake Wi-Fi hotspots and social engineering *
Systematically test your environment with Metasploit * Write or
customize sophisticated Metasploit exploits
|
|