Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
Drawing on more than 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore while addressing the realities of a world where billions of new devices are Internet-connected.
Introduction
Introduction to Computer Security
Networks and the Internet
Cyber Stalking, Fraud, and Abuse
Denial of Service Attacks
Malware
Techniques Used by Hackers
Industrial Espionage in Cyberspace
Encryption
Computer Security Technology
Security Policies
Network Scanning and Vulnerability Scanning
Cyber Terrorism and Information Warfare
Cyber Detective
Introduction to Forensics
Cybersecurity Engineering
Glossary
Appendix A. Resources
Appendix B. Answers to the Multiple Choice Questions