Skip to content

Network Security

Spend $50 to get a free DVD!

ISBN-10: 0470502495

ISBN-13: 9780470502495

Edition: 2nd 2009

Authors: Eric Cole, Ronald L. Krutz, James W. Conley, Cole

List price: $47.50
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


The Network Security Bible 2e is organized into seven sections covering all of the most recent security topics and developments in technology. Of note to the reader are the cutting edge topics of Integrated Cybersecurity and the Security Landscape sections with intriguing chapters on Validating Your Security, Data Protection, Forensics and Attacks and Threats.
Customers also bought

Book details

List price: $47.50
Edition: 2nd
Copyright year: 2009
Publisher: John Wiley & Sons, Limited
Publication date: 9/8/2009
Binding: Paperback
Pages: 936
Size: 7.25" wide x 9.50" long x 2.00" tall
Weight: 3.476
Language: English

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year's hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers…    

Network Security Landscape
State of Network Security
New Approaches to Cyber Security
Security Principles and Practices
Information System Security Principles
Information System Security Management
Access Control
Attacks and Threats
Operating Systems and Applications
Windows Security
UNIX and Linux Security
Web Browser and Client Security
Web Security
Electronic mail (E-mail) Security
DomainName System
Server Security
Network Security Fundamentals
Wireless Security
NetworkArchitecture Fundamentals
Intrusion Detection/Prevention
Secret Communication
Applications of Secure/Covert Communication
The Security Threat and Response
IntrusionDetection andResponse
Security Assessments, Testing, and Evaluation
Integrated Cyber Security
Validating Your Security
Putting Everything Together
The Future