Corporate Computer Security, Global Edition, 4th edition

Published by Pearson (August 7, 2014) © 2015

  • Randall J Boyle Weber State University
  • Raymond R. Panko University of Hawaii
Products list

Details

  • A print text
  • Free shipping

This product is expected to ship within 5-7 business days for Australian customers.

Title overview

For introductory courses in IT Security.

A strong business focus through a solid technical presentation of security tools.

Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace.

This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.

This program will provide a better teaching and learning experience–for you and your students. Here’s how:

  • Encourage Student’s to Apply Concepts: Each chapter now contains new hands-on projects that use contemporary software.
  • Business Environment Focus: This edition includes more of a focus on the business applications of the concepts. Emphasis has been placed on securing corporate information systems, rather than just hosts in general.
  • Keep Your Course Current and Relevant: New examples, exercises, and research findings appear throughout the text.

Table of contents

  • Preface
  • About the Authors
  • Chapter 1 The Threat Environment
  • Chapter 2 Planning and Policy
  • Chapter 3 Cryptography
  • Chapter 4 Secure Networks
  • Chapter 5 Access Control
  • Chapter 6 Firewalls
  • Chapter 7 Host Hardening
  • Chapter 8 Application Security
  • Chapter 9 Data Protection
  • Chapter 10 Incident and Disaster Response
  • A.1 Introduction
  • A.2 A Sampling of Networks
  • A.3 Network Protocols and Vulnerabilities
  • A.4 Core Layers in Layered Standards Architectures
  • A.5 Standards Architectures
  • A.6 Single-Network Standards
  • A.7 Internetworking Standards
  • A.8 The Internet Protocol
  • A.9 The Transmission Control Protocol
  • A.10 The User Datagram Protocol
  • A.11 TCP/IP Supervisory Standards
  • A.12 Application Standards
  • A.13 Conclusion
  • Glossary
  • index

Need help?Get in touch