Network Defense and Countermeasures: Principles and Practices

Author:   William Easttom, II ,  William Easttom, II
Publisher:   Pearson Education (US)
Edition:   3rd edition
ISBN:  

9780789759962


Pages:   544
Publication Date:   29 June 2018
Replaced By:   9780138200589
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $106.00 Quantity:  
Add to Cart

Share |

Network Defense and Countermeasures: Principles and Practices


Add your own review!

Overview

Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.

Full Product Details

Author:   William Easttom, II ,  William Easttom, II
Publisher:   Pearson Education (US)
Imprint:   Pearson IT Certification
Edition:   3rd edition
Dimensions:   Width: 18.00cm , Height: 3.00cm , Length: 23.00cm
Weight:   0.920kg
ISBN:  

9780789759962


ISBN 10:   0789759969
Pages:   544
Publication Date:   29 June 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Replaced By:   9780138200589
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Chapter 1: Introduction to Network Security Chapter 2: Types of Attacks Chapter 3: Fundamentals of Firewalls Chapter 4: Firewall Practical Applications Chapter 5: Intrusion-Detection Systems Chapter 6: Encryption Fundamentals Chapter 7: Virtual Private Networks Chapter 8: Operating System Hardening Chapter 9: Defending Against Virus Attacks Chapter 10: Defending Against Trojan Horses, Spyware, and Adware Chapter 11: Security Policies Chapter 12: Assessing System Security Chapter 13: Security Standards Chapter 14: Physical Security and Disaster Recovery Chapter 15: Techniques Used by Attackers Chapter 16: Introduction to Forensics Chapter 17: Cyber Terrorism Appendix A: Answers Glossary

Reviews

Author Information

Chuck Easttom is a computer scientist, author, and inventor. He has authored 25 other books on programming, Web development, security, and Linux. He has also authored dozens of research papers on a wide range of computer science and cyber security topics. He is an inventor with 13 computer science patents. Chuck holds more than 40 different industry certifications. He also is a frequent presenter/speaker at computer and cyber security conferences such as Defcon, ISC2 Security Congress, Secure World, IEEE workshops, and more. You can reach Chuck at his website (www.chuckeasttom.com) or by e-mail at chuck@chuckeasttom.com.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List