9780849331589

The Secrets to Carrier Class Network Security

by
  • ISBN13:

    9780849331589

  • ISBN10:

    0849331587

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2013-02-26
  • Publisher: Auerbach Public

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $79.95 Save up to $7.99
  • Rent Book $71.96
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

The authors are network security experts who have developed security products and services for the world's largest telecommunications carriers. Now, with The Secrets to Carrier Class Network Security, you can apply their Tier-1 security expertise toward networks of all sizes. This book details how to: defend your network from telecom (ISP) carrier-induced weaknesses; design your network environments with proven, vendor-neutral securityarchitectures; prevent your network from becoming a source of attack; and identify and react faster to threats. It tells how the world's best hackers develop new threats and provides a sneak peek at the next wave of hacking techniques.

Table of Contents

Defending the Internet: Network Backbones and Critical Infrastructure. Defending your Perimeter and Critical Internet Infrastructure. Defending Your Network from Itself and From Your Users. Defending Your Key Applications from Threats Local and Remote.

Rewards Program

Write a Review