Skip to content

Network Security: the Complete Reference

Best in textbook rentals since 2012!

ISBN-10: 0072226978

ISBN-13: 9780072226973

Edition: 2004

Authors: Roberta Bragg, Mark Rhodes-Ousley, Keith Strassberg

List price: $70.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This complete reference on network security provides comprehensive coverage of maintaining and securing a network; in-depth details on privacy issues and hacking techniques; and explanations of firewalls, intrusion detection systems and anti-virus software.
Customers also bought

Book details

List price: $70.00
Copyright year: 2004
Publisher: McGraw-Hill Osborne
Publication date: 11/10/2003
Binding: Paperback
Pages: 896
Size: 7.25" wide x 9.00" long x 1.75" tall
Weight: 3.146
Language: English

Mark Rhodes-Ousley has 20 years of experience with every aspect of security, from program management to technology. That experience includes risk management, security policies, security management, technology implementation and operations, physical security, disaster recovery, and business continuity planning. He holds two core beliefs: that business processes are just as important as technology because security relies on people; and that security should be a business enabler with a goal of enhancing the customer experience. Mark is CISSP, CISM, and MCSE certified.

Network Security Foundations
Network Security Overview
Risk Analysis and Defense Models
Security Policy Development
Security Organization
Access Control
Physical Security
Authentication and Authorization Controls
Data Security Architecture
Security Management Architecture
Network Architecture
Network Design Considerations
Network Device Security
Firewalls
Virtual Private Network Security
Wireless Network Security
Intrusion-Detection Systems
Integrity and Availability Architecture
Network Role-Based Security
Operating System Security
Operating System Security Models
Common Unix Vulnerabilities
Linux Security
Windows Security
Novell Security
Application Security
Principals of Application Security
Writing Secure Software
J2EE Security
Windows .NET Security
Database Security
Response
Disaster Recovery and Business Continuity
Attacks and Countermeasures
Incident Response and Forensic Analysis
Legal Issues: The Laws Affecting Information Security Professionals