Network Defense and Countermeasures: Principles and Practices, 1st edition

Published by Pearson IT Certification (April 3, 2018) © 2018

  • William Easttom
Products list

Access details

  • Digital eBook
  • Instant access
  • Available online, offline and via apps
  • Accessible through the VitalSource Bookshelf

Features

  • End-of-chapter exercises
  • Make highlights and notes
  • Search across the eBook content
Products list

Details

  • A print copy
  • Free shipping

Features

  • End-of-chapter exercises
  • Review questions
  • Real-world tips

This product is expected to ship within 5-7 business days for Australian customers.

A practical introduction to defending modern networks

Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned - in the classroom and in your career.

  • Chapter 1: Introduction to Network Security
  • Chapter 2: Types of Attacks
  • Chapter 3: Fundamentals of Firewalls
  • Chapter 4: Firewall Practical Applications
  • Chapter 5: Intrusion-Detection Systems
  • Chapter 6: Encryption Fundamentals
  • Chapter 7: Virtual Private Networks
  • Chapter 8: Operating System Hardening
  • Chapter 9: Defending Against Virus Attacks
  • Chapter 10: Defending Against Trojan Horses, Spyware, and Adware
  • Chapter 11: Security Policies
  • Chapter 12: Assessing System Security
  • Chapter 13: Security Standards
  • Chapter 14: Physical Security and Disaster Recovery
  • Chapter 15: Techniques Used by Attackers
  • Chapter 16: Introduction to Forensics
  • Chapter 17: Cyber Terrorism
  • Appendix A: Answers
  • Glossary

Need help? Get in touch