Skip to content

Network Security Bible

Best in textbook rentals since 2012!

ISBN-10: 0470502495

ISBN-13: 9780470502495

Edition: 2nd 2009

Authors: Eric Cole, Ronald L. Krutz, James W. Conley, Cole

List price: $47.50
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The Network Security Bible 2e is organized into seven sections covering all of the most recent security topics and developments in technology. Of note to the reader are the cutting edge topics of Integrated Cybersecurity and the Security Landscape sections with intriguing chapters on Validating Your Security, Data Protection, Forensics and Attacks and Threats.
Customers also bought

Book details

List price: $47.50
Edition: 2nd
Copyright year: 2009
Publisher: John Wiley & Sons, Limited
Publication date: 9/8/2009
Binding: Paperback
Pages: 944
Size: 7.30" wide x 9.20" long x 2.20" tall
Weight: 3.476
Language: English

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year's hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers…    

Introduction
Network Security Landscape
State of Network Security
New Approaches to Cyber Security
InterfacingwiththeOrganization
Security Principles and Practices
Information System Security Principles
Information System Security Management
Access Control
Attacks and Threats
Operating Systems and Applications
Windows Security
UNIX and Linux Security
Web Browser and Client Security
Web Security
Electronic mail (E-mail) Security
DomainName System
Server Security
Network Security Fundamentals
NetworkProtocols
Wireless Security
NetworkArchitecture Fundamentals
Firewalls
Intrusion Detection/Prevention
Communication
Secret Communication
CovertCommunication
Applications of Secure/Covert Communication
The Security Threat and Response
IntrusionDetection andResponse
Security Assessments, Testing, and Evaluation
Integrated Cyber Security
Validating Your Security
DataProtection
Putting Everything Together
The Future
Index