You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"Intended for introductory computer security, network security or information security courses. This title aims to serve as a gateway into the world of computer security by providing the coverage of the basic concepts, terminology and issues, along with practical skills." -- Provided by publisher.
ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING Clearly explains core concepts, terminology, and techniques Covers the foundational physics, math, and information theory you need Provides hands-on practice with quantum programming The perfect beginner's guide for anyone interested in a quantum computing career Dr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started. Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their impli...
The perfect introduction to pen testing for all IT professionals and students · Clearly explains key concepts, terminology, challenges, tools, and skills · Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today’s most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you’ll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You’ll gain practical experience through a start...
Digital Forensics, Investigation, and Response, Fourth Edition examines the fundamentals of system forensics, addresses the tools, techniques, and methods used to perform computer forensics and investigation, and explores incident and intrusion response,
This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and We...
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today’s latest attacks and countermeasures The perfect beginner’s guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities o...
Quantum computing is on the horizon and you can get started today! This practical, clear-spoken guide shows you don’t need a physics degree to write your first quantum software. In Quantum Computing in Action you will learn: An introduction to the core concepts of quantum computing Qubits and quantum gates Superposition, entanglement, and hybrid computing Quantum algorithms including Shor’s, Deutsch-jozsa, and Grover’s search Quantum Computing in Action shows you how to leverage your existing Java skills into writing your first quantum software, so you’re ready for the quantum revolution. This book is focused on practical implementations of quantum computing algorithms—there’s no...
Networking Fundamentals teaches the basic concepts and terminology of networking and is designed to prepare students for the CompTIA Network+ Certification Exam. The text covers media types and standards and how data is encoded and transmitted. Students are also introduced to the terminology and basic concepts of each network operating system. The Open Systems Interconnection (OSI) model is introduced in the first chapter, revisited throughout the textbook, and then examined in detail in Chapter 16, A Closer Look at the OSI Model. A complete chapter is dedicated to TCP/IP and another to subnetting. Teaches the student how to maintain, troubleshoot, design, and install networks. Includes Sample Network+ Exam Questions, Network+ Key Points, Network+ Notes, and a practice Network+ exam. Each chapter includes one laboratory activity taken from the Laboratory Manual. Meets requirements of the CompTIA Authorized Quality Curriculum Program, covering all objectives of the CompTIA Network+ Certification Exam.
The authors provide an introduction to quantum computing. Aimed at advanced undergraduate and beginning graduate students in these disciplines, this text is illustrated with diagrams and exercises.