Network Defense and Countermeasures: Principles and Practices
List price: $80.00
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: Network Defense and Countermeasures: Principles and Practices, Second Edition is the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with all practical skills essential to network defense. Drawing on extensive experience as both an IT professional and instructor, Chuck Easttom offers exceptionally practical coverage of these and other core topics:FirewallsIntrusion detection systemsOperating system hardeningDefense against virus attacks, Trojan horses and spywareSecurity policies, standards, and moreUnlike many other authors, however, he also fully addresses more specialized issues, from industrial espionage to cryptography (including public/private key systems, digital signatures, and certificates). This edition has been extensively updated to reflect massive technology changes in all areas of IT security, from tools to attacks to best practice countermeasures. New topics include: physical security, disaster recovery, social engineering, and common hacking techniques.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $80.00
Copyright year: 2013
Publisher: Pearson College Div
Size: 7.00" wide x 9.00" long x 1.00" tall
|Introduction to Network Security|
|Types of Attacks|
|Fundamentals of Firewalls|
|Practical Applications of Firewalls|
|Intrusion Detection Systems|
|Virtual Private Networks|
|Operating System Hardening|
|Defending against Virus Attacks|
|Defending against Trojan Horses and Spyware|
|Assessing System Security|
|Physical Security and Disaster Recovery|
|Specific Techniques Used by Attackers|
|Guide to Security Certifications|