9780840020932-0840020937-Computer Security and Penetration Testing

Computer Security and Penetration Testing

ISBN-13: 9780840020932
ISBN-10: 0840020937
Edition: 2
Author: Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown
Publication date: 2013
Publisher: Cengage Learning
Format: Paperback 512 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $22.41 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $24.17 USD
Buy

From $24.17

Rent

From $22.41

Book details

ISBN-13: 9780840020932
ISBN-10: 0840020937
Edition: 2
Author: Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown
Publication date: 2013
Publisher: Cengage Learning
Format: Paperback 512 pages

Summary

Computer Security and Penetration Testing (ISBN-13: 9780840020932 and ISBN-10: 0840020937), written by authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown, was published by Cengage Learning in 2013. With an overall rating of 4.3 stars, it's a notable title among other Networking & Cloud Computing (Network Security, Security & Encryption, Hacking) books. You can easily purchase or rent Computer Security and Penetration Testing (Paperback) from BooksRun, along with many other new and used Networking & Cloud Computing books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $6.69.

Description

Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new emphasis on ethics and legal issues. The world of information security is changing every day - readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book