Professional >> Engineering and Computer Science >> Computer Science >> Computer Science


Network Defense and Countermeasures: Principles and Practices

Network Defense and Countermeasures: Principles and Practices

Author(s):
  • William (Chuck) Easttom
  • Author: William (Chuck) Easttom
    • ISBN:9789389552881
    • 10 Digit ISBN:9389552885
    • Price:Rs. 975.00
    • Pages:544
    • Imprint:Pearson Education
    • Binding:Paperback
    • Status:Available


    Be the first to rate the book !!

    Network Defense and Countermeasures: Principles and Practices, Third Edition is designed to be the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to network defense. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, Ransomware, malware, security policies and security standards. Unlike many other authors, however, he also fully addresses more specialized issues, including cryptrography, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates.

     

    Table of Content

    "Chapter 1: Introduction to Network Security
    Chapter 2: Types of Attacks
    Chapter 3: Fundamentals of Firewalls
    Chapter 4: Firewall Practical Applications
    Chapter 5: Intrusion-Detection Systems
    Chapter 6: Encryption Fundamentals
    Chapter 7: Virtual Private Networks
    Chapter 8: Operating System Hardening
    Chapter 9: Defending Against Virus Attacks
    Chapter 10: Defending Against Trojan Horses, Spyware, and Adware
    Chapter 11: Security Policies
    Chapter 12: Assessing System Security
    Chapter 13: Security Standards
    Chapter 14: Physical Security and Disaster Recovery
    Chapter 15: Techniques Used by Attackers
    Chapter 16: Introduction to Forensics
    Chapter 17: Cyber Terrorism
    Appendix A
    Glossary
    "
     

    Salient Features

    1. The most up-to-date network defense text on the market
    2. Solid coverage of basic cryptography including its history, symmetric key systems, public/private key systems and digital signatures and certificates
    3. Covers oft-neglected subject areas such as defense strategies, forms of attacks, and policies related to network security
    4. Contains end-of-chapter exercises, projects, review questions, and plenty of real-world tips