Computer Security Fundamentals (2nd Edition) and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $79.99
  • Save: $61.75 (77%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: May 30, 2015
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Access codes and supplements are not guaranteed with used items.
Qty:1
  • List Price: $79.99
  • Save: $14.79 (18%)
Only 17 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Computer Security Fundame... has been added to your Cart
Sell yours for a Gift Card
We'll buy it for $17.11
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Computer Security Fundamentals (2nd Edition) Paperback – December 30, 2011

ISBN-13: 978-0789748904 ISBN-10: 0789748908 Edition: 2nd

Buy New
Price: $65.20
Rent
Price: $18.24
32 New from $58.18 35 Used from $34.14
Rent from Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$18.24
$65.20
$58.18 $34.14
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Hero Quick Promo
Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Frequently Bought Together

Computer Security Fundamentals (2nd Edition) + Computer Forensics and Cyber Crime: An Introduction (3rd Edition)
Price for both: $145.95

Buy the selected items together
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 352 pages
  • Publisher: Pearson IT Certification; 2 edition (December 30, 2011)
  • Language: English
  • ISBN-10: 0789748908
  • ISBN-13: 978-0789748904
  • Product Dimensions: 7 x 0.7 x 9.1 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #214,760 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Chuck Easttom has been in the IT industry for many years working in all aspects including network administration, software engineering, and IT managementFor the past 10 years he has been parttime teaching at colleges and doing corporate trainingFor the past 7 years, he has also been an independent consultant working with a variety of companies and serving as an expert consultant/witness in various computer casesChuck holds more than 28 different IT industry certifications, including the CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified InstructorHe has served as a subject matter expert for the Computer Technology Industry Association (CompTIA) in the development or revision of four of their certification tests, including the initial creation of their Security+ certification. Most recently he worked with the EC Council to develop their new advanced cryptography course, which he is teaching around the world.

 

In addition to this book, Chuck has authored 12 other titles on topics such as computer security, web development, programming, Linux, and computer crimeChuck also is a frequent guest speaker for computer groups, discussing computer securityYou can reach Chuck at his website www.chuckeasttom.com or by email at chuck@chuckeasttom.com

Customer Reviews

I am glad I got this book over renting it.
Kajankow
This book has brought a lot of insight to some of the things I already knew.
Andre Dowdell
Very easy to read and extremely informative.
Adam G.

Most Helpful Customer Reviews

4 of 5 people found the following review helpful By Jerald S Jackson on May 28, 2013
Format: Kindle Edition Verified Purchase
To preface the statements below, I have worked in the computer industry managing large scale computer systems for 18 years. With that said...

I believe this might be the worst book on technical subject matter I have ever been forced to read. The author rambles, is incredibly Microsoft centric (not a linux bigot here, but the internet is filled with vastly more unix derivatives, cisco ios and other random devices than microsoft os's.

In the first chapter he references that movie we all know and love (ahem) Sneakers to reference a class of "good" hackers. He goes on to spell out each of the names of the people involved in the movie, which ok...great that you like the movie, but why is that in this book?

Pages are devoted to wire types. After giving some of the history of other hardware and protocols, one might assume he would know there are/were in fact other wire types than RJ45/ethernet, one would be wrong. He spends paragraphs talking about hubs, then states that they are no longer made and you probably will never see one. Again...an editor would so help with the content here.

As a first rough draft, this is probably a reasonable reference for someone who knows nothing of computer security. As a 2nd edition it is an embarrassment to the Author, Editors and publishing company.

I would not suggest this book to anyone. There are many other fantastic references on computer security and history that would be of much more value.

Have you ever read something and felt as though it were reducing your intelligence? Read this and you will.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By JM on October 10, 2013
Format: Kindle Edition Verified Purchase
Nice book very well written. Helps out alot. Main purpose to learn about security and different things that can cause viruses and how to prevent them
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Kajankow on September 7, 2012
Format: Kindle Edition Verified Purchase
This book is great when explaining the little things easily. I am glad I got this book over renting it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Andre Dowdell on October 18, 2012
Format: Paperback Verified Purchase
This is one of my smallest but most interesting books. This book has brought a lot of insight to some of the things I already knew. I felt like everyone can learn something from this book, no matter where you are in your IT career.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Tn901A on June 13, 2013
Format: Paperback Verified Purchase
Very informative book just what i needed for class. It got me a head start and provided insight in the essentials.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Wabbit on April 14, 2014
Format: Kindle Edition Verified Purchase
This book was required for a class.
Actually very easy for a novice to read - which is very good considering the field!

Would recommend for non-IT-related computer users.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

More About the Author

I have been in the IT profession for many years. I have published 18 computer science books (so far, currently working on 19). I also have five patents, including a distributed steganography method. I was a subject matter expert for CompTIA in the creation of their Security+, Linux+, and Server+ certification tests and on the Job Task Analysis team for CEH v8. I hold a 29 IT certifications (A+, Network+, iNet+, Linux+, Server+, MCP, MCAD, MCSA, MCSE, MCDBA,MCTS, MCITP, CEH, CHFI, CISSP, CCFP, ISSAP, and more). You can find out more about me at www.ChuckEasttom.com

You can also join my FaceBook Fan page at http://www.facebook.com/#!/pages/Chuck-Easttom-Fan-Page/112433175435672?ref=ts

I love teaching and writing. And I hope my books are a vehicle for learning. It is my goal to teach you new technologies in a way that it very readable, conversational.


I live in Texas (near Dallas) and am married to a wonderful woman (Teresa).

What Other Items Do Customers Buy After Viewing This Item?