Skip to content

Network Defense and Countermeasures Principles and Practices

Best in textbook rentals since 2012!

ISBN-10: 0131711261

ISBN-13: 9780131711266

Edition: 2006

Authors: Chuck Easttom, William Easttom

List price: $132.40
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

KEY BENEFIT:Network Defense and Countermeasuresfills a void left by other books with complete coverage of a wide range of defense strategies, forms of attacks, and policies related to computer security.KEY TOPICS: This comprehensive volume covers practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, security policies and security standards.For network administrators, network security professionals and security audit professionals.
Customers also bought

Book details

List price: $132.40
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 7/6/2005
Binding: Paperback
Pages: 448
Size: 7.75" wide x 9.50" long x 0.75" tall
Weight: 1.496
Language: English

Chuck Easttom has 15 years' experience in the IT industry and has been an expert witness on several computer-related cases. He is the author of ten computer-science books including two textbooks on computer security. He was also one of the subject matter experts who helped to create CompTIA's Security+ certification test. He has been a frequent guest speaker on computer security at various computer groups and campuses including Harvard and Columbia. He holds more than a dozen computer industry certifications.

Preface
Introduction to Network Security
Types of Attacks
Fundamentals of Firewalls
Firewall Practical Applications
Intrusion Detection Systems
Encryption
Virtual Private Networks
Operating System Hardening
Defending against Virus Attacks
Defending against Trojan Horses and Spyware
Security Policies
Assessing a System
Security Standards
Computer-based Espionage and Terrorism
Resources
Computer Security Education and Certifications
Glossary
References
Index