Practice of Network Security, The: Deployment Strategies for Production Environments
©1996 |Prentice Hall | Available
©1996 |Prentice Hall | Available
Appropriate for all courses in network or information security.
This book teaches students how to secure any network, large or small. More than other books, it reflects the realities network administrators actually face on the front lines, where they are constantly under attack, and don't always get the support they need from their organizations. Former UUNet network architect Allan Liska addresses every facet of network security, including defining security models, access control, Web/DNS/email security, remote access and VPNs, wireless LAN/WAN security, day-to-day monitoring and logging, attack response, and more. He systematically identifies today's most widespread security mistakes and vulnerabilities, offering realistic and up-to-date solutions. He then integrates these techniques in an end-to-end case study, showing how to redesign an insecure enterprise network for maximum security, one step at a time.
Sample chapter is available for download in PDF format.
This material is protected under all copyright laws, as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.
Gives students a realistic understanding of how network security concepts and tools work together in real networks and organizations.
Helps students understand all stages of the security project lifecycle, and succeed regardless of the phase or task they are given responsibility for.
Teaches students how to improve security in organizational environments with ubiquitous connections to the Internet.
Gives students expertise that is in increasingly high demand, as wireless networks spread rapidly throughout organizations and businesses.
In-depth coverage of access control—Systematically reviews techniques for controlling access via authentication, authorization, and accounting.
Ensure that students know how to provide the basic access control that every secure network is built upon.
Reflects the reality that attacks will be launched against virtually every server or organization, and gives students realistic, practical techniques for responding.
Helps students address one of today's most common security challenges: reliable, secure remote access.
1. Defining the Scope.
Pearson offers special pricing when you package your text with other student resources. If you're interested in creating a cost-saving package for your students, contact your Pearson rep.
ALLAN LISKA is a Security Engineer with Symantec's Enterprise Security Services division. Prior to that Mr. Liska spent six years at WorldCom, where he served as a network architect for WorldCom's hosting division. He is also a CISSP who has written about network management, administration, and Web-server security.
We're sorry! We don't recognize your username or password. Please try again.
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
You have successfully signed out and will be required to sign back in should you need to download more resources.