Network Defense and Countermeasures: Principles and Practices, 1st edition

Published by Pearson IT Certification (April 3, 2018) © 2018

  • William Easttom
Products list
  • Available for purchase from all major ebook resellers, including InformIT.com
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com
Products list

Access Details

  • Access courses online from any computer (PC or Mac) or tablet (Android or iOS)
  • Native app available for mobile use; use online, or download and work offline; data syncs automatically 
  • Purchase print or digital codes from your college bookstore, or printed access code cards here

Features

  • Interactive learning elements throughout, including exercises, quizzes, flashcards, and video tutorials
Network Defense and Countermeasures: Principles and Practices, Third Edition is designed to be the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to network defense. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, Ransomware, malware, security policies and security standards. Unlike many other authors, however, he also fully addresses more specialized issues, including cryptrography, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates.
  • Chapter 1: Introduction to Network Security
  • Chapter 2: Types of Attacks
  • Chapter 3: Fundamentals of Firewalls
  • Chapter 4: Firewall Practical Applications
  • Chapter 5: Intrusion-Detection Systems
  • Chapter 6: Encryption Fundamentals
  • Chapter 7: Virtual Private Networks
  • Chapter 8: Operating System Hardening
  • Chapter 9: Defending Against Virus Attacks
  • Chapter 10: Defending Against Trojan Horses, Spyware, and Adware
  • Chapter 11: Security Policies
  • Chapter 12: Assessing System Security
  • Chapter 13: Security Standards
  • Chapter 14: Physical Security and Disaster Recovery
  • Chapter 15: Techniques Used by Attackers
  • Chapter 16: Introduction to Forensics
  • Chapter 17: Cyber Terrorism
  • Appendix A: Answers
  • Glossary

Need help? Get in touch