Published by Pearson (January 23, 2015) © 2015
Randall Boyle | Raymond PankoFor introductory courses in IT Security.
A strong business focus through a solid technical presentation of security tools.
Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace.
This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.
This program will provide a better teaching and learning experience–for you and your students. Here’s how:
- Encourage Student’s to Apply Concepts: Each chapter now contains new hands-on projects that use contemporary software.
- Business Environment Focus: This edition includes more of a focus on the business applications of the concepts. Emphasis has been placed on securing corporate information systems, rather than just hosts in general.
- Keep Your Course Current and Relevant: New examples, exercises, and research findings appear throughout the text.
The full text downloaded to your computer
With eBooks you can:
- search for key concepts, words and phrases
- make highlights and notes as you study
- share your notes with friends
eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.
Upon purchase, you'll gain instant access to this eBook.
Time limit
The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.
- Preface
- About the Authors
- Chapter 1 The Threat Environment
- Chapter 2 Planning and Policy
- Chapter 3 Cryptography
- Chapter 4 Secure Networks
- Chapter 5 Access Control
- Chapter 6 Firewalls
- Chapter 7 Host Hardening
- Chapter 8 Application Security
- Chapter 9 Data Protection
- Chapter 10 Incident and Disaster Response
- A.1 Introduction
- A.2 A Sampling of Networks
- A.3 Network Protocols and Vulnerabilities
- A.4 Core Layers in Layered Standards Architectures
- A.5 Standards Architectures
- A.6 Single-Network Standards
- A.7 Internetworking Standards
- A.8 The Internet Protocol
- A.9 The Transmission Control Protocol
- A.10 The User Datagram Protocol
- A.11 TCP/IP Supervisory Standards
- A.12 Application Standards
- A.13 Conclusion
- Glossary
- index