All you need to know about defending networks, in one book
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned―in the classroom and in your career.
LEARN HOW TO
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Chuck Easttom is the author of 41 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for Vanderbilt University.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Devils in the Detail Ltd, Oxford, Vereinigtes Königreich
Zustand: Very Good. Picture Shown is For Illustration Purposes Only, Please See Below For Further DetailsCONDITION ? VERY GOOD - PAPERBACKlight wear and scuff marks to cover, pages in nice condition, shipped from the UK. Artikel-Nr. 443/BT/960P 0589
Anzahl: 1 verfügbar
Anbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Good. 4. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Artikel-Nr. 0138200580-11-1
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. GB-9780138200589
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. GB-9780138200589
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 4th edition. 592 pages. 9.25x7.25x1.25 inches. In Stock. Artikel-Nr. __0138200580
Anzahl: 2 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Artikel-Nr. 397898769
Anzahl: 1 verfügbar
Anbieter: Speedyhen, London, Vereinigtes Königreich
Zustand: NEW. Artikel-Nr. NW9780138200589
Anzahl: 2 verfügbar
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2024. 4th Edition. paperback. . . . . . Books ship from the US and Ireland. Artikel-Nr. V9780138200589
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. LEARN HOW TO Evaluate key network risks and dangersChoose the right network security approach for your organizationAnticipate and counter widespread network attacks, including those based on 'social engineering'Successfully deploy and apply firewalls and intrusion detection systemsSecure network communication with virtual private networksProtect data with cryptographic public/private key systems, digital signatures, and certificatesDefend against malware, including ransomware, Trojan horses, and spywareHarden operating systems and keep their security up to dateDefine and implement security policies that reduce riskExplore leading security standards and models, including ISO and NIST standardsPrepare for an investigation if your network has been attackedUnderstand the growing risks of espionage and cyberterrorism. Artikel-Nr. 9780138200589
Anzahl: 1 verfügbar