Network Defense and Countermeasures

Principles and Practices

Nonfiction, Computers, Networking & Communications
Cover of the book Network Defense and Countermeasures by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780133384383
Publisher: Pearson Education Publication: October 18, 2013
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780133384383
Publisher: Pearson Education
Publication: October 18, 2013
Imprint: Pearson IT Certification
Language: English

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

¿

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

¿

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

¿

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

¿

Learn how to

Understand essential network security concepts, challenges, and careers

Learn how modern attacks work

Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

Select the right security technologies for any network environment

Use encryption to protect information

Harden Windows and Linux systems and keep them patched

Securely configure web browsers to resist attacks

Defend against malware

Define practical, enforceable security policies

Use the “6 Ps” to assess technical and human aspects of system security

Detect and fix system vulnerability

Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

Ensure physical security and prepare for disaster recovery

Know your enemy: learn basic hacking, and see how to counter it

Understand standard forensic techniques and prepare for investigations of digital crime

¿

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

¿

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

¿

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

¿

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

¿

Learn how to

Understand essential network security concepts, challenges, and careers

Learn how modern attacks work

Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

Select the right security technologies for any network environment

Use encryption to protect information

Harden Windows and Linux systems and keep them patched

Securely configure web browsers to resist attacks

Defend against malware

Define practical, enforceable security policies

Use the “6 Ps” to assess technical and human aspects of system security

Detect and fix system vulnerability

Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

Ensure physical security and prepare for disaster recovery

Know your enemy: learn basic hacking, and see how to counter it

Understand standard forensic techniques and prepare for investigations of digital crime

¿

More books from Pearson Education

Cover of the book How to Have a Brilliant Life by William (Chuck) Easttom II
Cover of the book The Addicted Brain: Why We Abuse Drugs, Alcohol, and Nicotine by William (Chuck) Easttom II
Cover of the book Adobe Lightroom mobile by William (Chuck) Easttom II
Cover of the book Requirements by Collaboration by William (Chuck) Easttom II
Cover of the book The Little Book of Big Management Questions by William (Chuck) Easttom II
Cover of the book Troubleshooting with the Windows Sysinternals Tools by William (Chuck) Easttom II
Cover of the book What Makes People Listen to Your Presentation by William (Chuck) Easttom II
Cover of the book The Java EE 6 Tutorial by William (Chuck) Easttom II
Cover of the book Programming with the Kinect for Windows Software Development Kit by William (Chuck) Easttom II
Cover of the book Building Better Business Teams by William (Chuck) Easttom II
Cover of the book Microsoft Exchange Server 2010 Administrator's Pocket Consultant by William (Chuck) Easttom II
Cover of the book My Digital Photography for Seniors by William (Chuck) Easttom II
Cover of the book Microsoft Office Project 2007 Step by Step by William (Chuck) Easttom II
Cover of the book SharePoint 2010 Development with Silverlight by William (Chuck) Easttom II
Cover of the book Nikon D3000: From Snapshots to Great Shots by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy