Skip to content

Guide to Tactical Perimeter Defense Becoming a Security Network Specialist

Best in textbook rentals since 2012!

ISBN-10: 1428356304

ISBN-13: 9781428356306

Edition: 2008

Authors: Randy Weaver, Dawn Weaver

List price: $206.95
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the Security Certified Network Specialist certification (SCO-451), this book includes coverage of network security threats and goals, advanced TCP/IP concepts, router security, intrusion detection, firewall design and configuration, IPSec and virtual private network (VPN) design, and wireless network design and security.
Customers also bought

Book details

List price: $206.95
Copyright year: 2008
Publisher: Course Technology
Publication date: 12/6/2007
Binding: Paperback
Pages: 544
Size: 7.50" wide x 9.00" long x 0.75" tall
Weight: 2.090
Language: English

Randy Weaver is an Academic Program Director for Everest college, where he has worked for seven years administering IT programs for the college and teaching IT classes. He has taken and passed more than 40 industry certification exams, including 3 MCSEs, CCNA, CNE, Security+, Network+, iNet+, Linux+, Server+, CIW Master Administrator, and CISSP. Randy has a master's degree in information technology and has served on many Thomson Course Technology titles as reviewer, technical editor, and author.

Network Defense Fundamentals
Advanced TCP/IP Router Fundamentals
Fundamentals of Cisco
Router Security Designing Firewalls
Configuring Firewalls
Managing Firewalls to Improve Security
Implementing IPSec and Virtual
Private Networks Designing Virtual
Private Networks Designing Intrusion
Detection Systems Configuring and Using Intrusion
Detection Systems Wireless
Network Fundamentals
Securing Wireless Networks