All you need to know about defending networks, in one book
Welcome to today''s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you''ll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You''ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You''ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you''ve learned―in the classroom and in your career.
LEARN HOW TO
"synopsis" may belong to another edition of this title.
Dr. Chuck Easttom is the author of 41 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for Vanderbilt University.
"About this title" may belong to another edition of this title.
£ 3.99 shipping within United Kingdom
Destination, rates & speedsSeller: Devils in the Detail Ltd, Oxford, United Kingdom
Condition: Very Good. Picture Shown is For Illustration Purposes Only, Please See Below For Further DetailsCONDITION ? VERY GOOD - PAPERBACKlight wear and scuff marks to cover, pages in nice condition, shipped from the UK. Seller Inventory # 443/BT/960P 0589
Quantity: 1 available
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Good. 4. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 0138200580-11-1
Quantity: 1 available
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Very Good. 4. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 0138200580-8-1
Quantity: 2 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 45733348-n
Quantity: Over 20 available
Seller: Speedyhen, London, United Kingdom
Condition: NEW. Seller Inventory # NW9780138200589
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 45733348
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # GB-9780138200589
Quantity: 1 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learnedin the classroom and in your career. LEARN HOW TO Evaluate key network risks and dangersChoose the right network security approach for your organizationAnticipate and counter widespread network attacks, including those based on "social engineering"Successfully deploy and apply firewalls and intrusion detection systemsSecure network communication with virtual private networksProtect data with cryptographic public/private key systems, digital signatures, and certificatesDefend against malware, including ransomware, Trojan horses, and spywareHarden operating systems and keep their security up to dateDefine and implement security policies that reduce riskExplore leading security standards and models, including ISO and NIST standardsPrepare for an investigation if your network has been attackedUnderstand the growing risks of espionage and cyberterrorism Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9780138200589
Quantity: 1 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9780138200589_new
Quantity: 1 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # GB-9780138200589
Quantity: 1 available