All you need to know about defending networks, in one book
- Clearly explains concepts, terminology, challenges, tools, and skills
- Covers key security standards and models for business and government
- The perfect introduction for all network/computer security professionals and students
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career.
Learn How To
- Evaluate key network risks and dangers
- Choose the right network security approach for your organization
- Anticipate and counter widespread network attacks, including those based on "social engineering"
- Successfully deploy and apply firewalls and intrusion detection systems
- Secure network communication with virtual private networks
- Protect data with cryptographic public/private key systems, digital signatures, and certificates
- Defend against malware, including ransomware, Trojan horses, and spyware
- Harden operating systems and keep their security up to date
- Define and implement security policies that reduce risk
- Explore leading security standards and models, including ISO and NIST standards
- Prepare for an investigation if your network has been attacked
- Understand the growing risks of espionage and cyberterrorism
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Normal 0 false false false EN-US X-NONE X-NONE Chuck Easttom is a computer scientist, author, and inventor. He has authored 25 other books on programming, Web development, security, and Linux. He has also authored dozens of research papers on a wide range of computer science and cyber security topics. He is an inventor with 13 computer science patents. Chuck holds more than 40 different industry certifications. He also is a frequent presenter/speaker at computer and cyber security conferences such as Defcon, ISC2 Security Congress, Secure World, IEEE workshops, and more.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 9,54 expédition depuis Etats-Unis vers France
Destinations, frais et délaisEUR 9,70 expédition depuis Allemagne vers France
Destinations, frais et délaisVendeur : BooksRun, Philadelphia, PA, Etats-Unis
Paperback. Etat : Good. 3. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. N° de réf. du vendeur 0789759969-11-1
Quantité disponible : 1 disponible(s)
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
Etat : Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. N° de réf. du vendeur 00069824270
Quantité disponible : 1 disponible(s)
Vendeur : Outer Print, Richmond, VA, Etats-Unis
Soft cover. Etat : Near Fine. 3rd Edition. Near Fine paperback. Overall a bright and attractive copy. No markings to the text. Slight shelf wear to the exterior. 522 pp. N° de réf. du vendeur 003851
Quantité disponible : 1 disponible(s)
Vendeur : Once Upon A Time Books, Siloam Springs, AR, Etats-Unis
paperback. Etat : Acceptable. This is a used book. It may contain highlighting/underlining and/or the book may show heavier signs of wear . It may also be ex-library or without dustjacket. This is a used book. It may contain highlighting/underlining and/or the book may show heavier signs of wear . It may also be ex-library or without dustjacket. N° de réf. du vendeur mon0003302664
Quantité disponible : 1 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Über den AutorInhaltsverzeichnisChapter 1: Introduction to Network Security Introduction The Basics of a Network Basic Network Structure Data Packets IP Addresses. N° de réf. du vendeur 594997420
Quantité disponible : Plus de 20 disponibles
Vendeur : SGS Trading Inc, Franklin Lakes, NJ, Etats-Unis
Paperback. Etat : Good. Textbook, May Have Highlights, Notes and/or Underlining, BOOK ONLYNO ACCESS CODE, NO CD, Ships with Emailed Tracking. N° de réf. du vendeur SKU0475971
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Neuware - Network Defense and Countermeasures: Principles and Practices, Third Edition is designed to be the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to network defense. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, Ransomware, malware, security policies and security standards. Unlike many other authors, however, he also fully addresses more specialized issues, including cryptrography, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates. N° de réf. du vendeur 9780789759962
Quantité disponible : 2 disponible(s)
Vendeur : Toscana Books, AUSTIN, TX, Etats-Unis
Paperback. Etat : new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. N° de réf. du vendeur Scanned0789759969
Quantité disponible : 1 disponible(s)
Vendeur : Goodwill of Colorado, COLORADO SPRINGS, CO, Etats-Unis
Etat : Good. This item is in overall good condition. Covers and dust jackets are intact but may have minor wear including slight curls or bends to corners as well as cosmetic blemishes including stickers. Pages are intact but may have minor highlighting/ writing. Binding is intact; however, spine may have slight wear overall. Digital codes may not be included and have not been tested to be redeemable and/or active. Minor shelf wear overall. Please note that all items are donated goods and are in used condition. Orders shipped Monday through Friday! Your purchase helps put people to work and learn life skills to reach their full potential. Orders shipped Monday through Friday. Your purchase helps put people to work and learn life skills to reach their full potential. Thank you! N° de réf. du vendeur 466SUS0037V8
Quantité disponible : 1 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 3rd edition. 550 pages. 9.00x7.00x1.25 inches. In Stock. N° de réf. du vendeur zk0789759969
Quantité disponible : 1 disponible(s)