Computer Security Fundamentals, 4th edition

Published by Pearson IT Certification (July 14, 2021) © 2020

  • William Chuck Easttom

Pearson+ subscription

ISBN-13: 9780137459674
Computer Security Fundamentals
Published 2021

eTextbook features

  • Instant access to eTextbook
  • Search, highlight, and notes
  • Create flashcards

Computer Security Fundamentals, Fourth Edition: 

  • Clearly explains core concepts, terminology, challenges, technologies, and skills
  • Covers today’s latest attacks and countermeasures 
  • The perfect beginner’s guide for anyone interested in a computer security career

Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills students need to get started.

Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps students take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.


This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help students deepen their understanding and apply all they've learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

  • Chapter 1: Introduction to Computer Security
  • Chapter 2: Networks and the Internet
  • Chapter 3: Cyber Stalking, Fraud, and Abuse
  • Chapter 4: Denial of Service Attacks
  • Chapter 5: Malware
  • Chapter 6: Techniques Used by Hackers
  • Chapter 7: Industrial Espionage in Cyberspace
  • Chapter 8: Encryption
  • Chapter 9: Computer Security Technology
  • Chapter 10: Security Policies
  • Chapter 11: Network Scanning and Vulnerability Scanning
  • Chapter 12: Cyber Terrorism and Information Warfare
  • Chapter 13: Cyber Detective
  • Chapter 14: Introduction to Forensics
  • Chapter 15: Cybersecurity Engineering
  • Glossary
  • Appendix A: Resources
  • Appendix B: Answers to the Multiple Choice Questions

Need help? Get in touch