Network Defense and Countermeasures

Principles and Practices

Nonfiction, Computers, Networking & Communications
Cover of the book Network Defense and Countermeasures by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780133384383
Publisher: Pearson Education Publication: October 18, 2013
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780133384383
Publisher: Pearson Education
Publication: October 18, 2013
Imprint: Pearson IT Certification
Language: English

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

¿

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

¿

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

¿

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

¿

Learn how to

Understand essential network security concepts, challenges, and careers

Learn how modern attacks work

Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

Select the right security technologies for any network environment

Use encryption to protect information

Harden Windows and Linux systems and keep them patched

Securely configure web browsers to resist attacks

Defend against malware

Define practical, enforceable security policies

Use the “6 Ps” to assess technical and human aspects of system security

Detect and fix system vulnerability

Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

Ensure physical security and prepare for disaster recovery

Know your enemy: learn basic hacking, and see how to counter it

Understand standard forensic techniques and prepare for investigations of digital crime

¿

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

¿

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

¿

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

¿

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

¿

Learn how to

Understand essential network security concepts, challenges, and careers

Learn how modern attacks work

Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

Select the right security technologies for any network environment

Use encryption to protect information

Harden Windows and Linux systems and keep them patched

Securely configure web browsers to resist attacks

Defend against malware

Define practical, enforceable security policies

Use the “6 Ps” to assess technical and human aspects of system security

Detect and fix system vulnerability

Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

Ensure physical security and prepare for disaster recovery

Know your enemy: learn basic hacking, and see how to counter it

Understand standard forensic techniques and prepare for investigations of digital crime

¿

More books from Pearson Education

Cover of the book The Interface between Demand Management and Production Strategies at TractParts by William (Chuck) Easttom II
Cover of the book Microsoft Exchange Server 2007 Administrator's Companion by William (Chuck) Easttom II
Cover of the book Applying Use Cases by William (Chuck) Easttom II
Cover of the book Power Up Your Confidence by William (Chuck) Easttom II
Cover of the book Word 2016 In Depth (includes Content Update Program) by William (Chuck) Easttom II
Cover of the book The Self-Destructive Habits of Good Companies by William (Chuck) Easttom II
Cover of the book Top-Down Network Design by William (Chuck) Easttom II
Cover of the book My Xbox: Xbox 360, Kinect, and Xbox LIVE by William (Chuck) Easttom II
Cover of the book 3D User Interfaces by William (Chuck) Easttom II
Cover of the book Exchange Server 2010 Unleashed by William (Chuck) Easttom II
Cover of the book The Bloody Chamber: York Notes for AS & A2 by William (Chuck) Easttom II
Cover of the book Why Your Company Must Have a Design Culture by William (Chuck) Easttom II
Cover of the book Sams Teach Yourself PHP, MySQL and Apache All in One by William (Chuck) Easttom II
Cover of the book Microsoft Office PowerPoint 2007 for Windows by William (Chuck) Easttom II
Cover of the book Law Express Question and Answer: Equity and Trusts by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy