CART

(0) items

Network Defense and Countermeasures Principles and Practices,9780789750945
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Network Defense and Countermeasures Principles and Practices

by
Edition:
2nd
ISBN13:

9780789750945

ISBN10:
0789750945
Format:
Paperback
Pub. Date:
10/28/2013
Publisher(s):
Pearson IT Certification

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 2nd edition with a publication date of 10/28/2013.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Related Products


  • Network Defense and Countermeasures Principles and Practices
    Network Defense and Countermeasures Principles and Practices





Summary

Network Defense and Countermeasures:

Principles and Practices

 

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

 

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

 

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

 

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

 

Chuck Easttom has worked in all aspects of IT, including network administration, software engineering, and IT management. For several years, he has taught IT topics in college and corporate environments, worked as an independent IT consultant, and served as an expert witness in court cases involving computers. He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. He served as subject matter expert for CompTIA in its development or revision of four certification tests, including Security+. He recently assisted the EC Council in developing its new advanced cryptography course. Easttom has authored 13 books on topics including computer security and crime.

 

Learn how to

  n  Understand essential network security concepts, challenges, and careers

  n  Learn how modern attacks work

  n  Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

  n  Select the right security technologies for any network environment

  n  Use encryption to protect information

  n  Harden Windows and Linux systems and keep them patched

  n  Securely configure web browsers to resist attacks

  n  Defend against malware

  n  Define practical, enforceable security policies

  n  Use the “6 Ps” to assess technical and human aspects of system security

  n  Detect and fix system vulnerability

  n  Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

  n  Ensure physical security and prepare for disaster recovery

  n  Know your enemy: learn basic hacking, and see how to counter it

  n  Understand standard forensic techniques and prepare for investigations of digital crime

 

Author Biography

Chuck Easttom is a security consultant, author, and trainer. He has authored fourteen other books on programming, Web development, security, and Linux. Chuck holds more than 28 different industry certifications including CISSP, CEH, CHFI, ECSA, CIW Security Analyst, MCSE, MCSA, MCDBA, MCAD, Server+, and more. He has served as a subject matter expert for the Computer Technology Industry Association (CompTIA) in the development or revision of four of their certification tests, including the initial creation of their Security+ certification. He also developed the ECES cryptography certification for the EC Council. Chuck is a frequent guest speaker for computer groups, discussing computer security. You can reach Chuck at his website (www.chuckeasttom.com) or by email at chuck@chuckeasttom.com.

Table of Contents

1. Introduction to Network Security

2. Types of Attacks

3. Fundamentals of Firewalls

4. Practical Applications of Firewalls

5. Intrusion Detection Systems

6. Encryption Fundamentals

7. Virtual Private Networks

8. Operating System Hardening

9. Defending against Virus Attacks

10. Defending against Trojan Horses and Spyware

11. Security Policies

12. Assessing System Security

13. Security Standards

14. Physical Security and Disaster Recovery

15. Specific Techniques Used by Attackers

Appendix A: Security Resources

Appendix B: Terminology

Appendix C: Guide to Security Certifications



Please wait while the item is added to your cart...