did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.


Network Defense and Countermeasures Principles and Practices

  • ISBN13:


  • ISBN10:


  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2018-04-16
  • Publisher: Pearson IT Certification
  • View Upgraded Edition
This product is included in:
Learn More

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $80.00 Save up to $60.26
  • Rent Book $19.74
    Add to Cart Free Shipping Icon Free Shipping


    7-Day eTextbook Access 7-Day eTextbook Access

    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?


All you need to know about defending networks, in one book

·         Clearly explains concepts, terminology, challenges, tools, and skills

·         Covers key security standards and models for business and government

·         The perfect introduction for all network/computer security professionals and students

Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.


Learn How To

·         Evaluate key network risks and dangers

·         Choose the right network security approach for your organization

·         Anticipate and counter widespread network attacks, including those based on “social engineering”

·         Successfully deploy and apply firewalls and intrusion detection systems

·         Secure network communication with virtual private networks

·         Protect data with cryptographic public/private key systems, digital signatures, and certificates

·         Defend against malware, including ransomware, Trojan horses, and spyware

·         Harden operating systems and keep their security up to date

·         Define and implement security policies that reduce risk

·         Explore leading security standards and models, including ISO and NIST standards

·         Prepare for an investigation if your network has been attacked

·     &nb

Author Biography

Chuck Easttom is a computer scientist, author, and inventor. He has authored 25 other books on programming, Web development, security, and Linux. He has also authored dozens of research papers on a wide range of computer science and cyber security topics. He is an inventor with 13 computer science patents. Chuck holds more than 40 different industry certifications. He also is a frequent presenter/speaker at computer and cyber security conferences such as Defcon, ISC2 Security Congress, Secure World, IEEE workshops, and more.

You can reach Chuck at his website (www.chuckeasttom.com) or by e-mail at chuck@chuckeasttom.com.

Table of Contents

Chapter 1: Introduction to Network Security
Chapter 2: Types of Attacks
Chapter 3: Fundamentals of Firewalls
Chapter 4: Firewall Practical Applications
Chapter 5: Intrusion Detection Systems
Chapter 6: Encryption Fundamentals
Chapter 7: Virtual Private Networks
Chapter 8: Operating System Hardening
Chapter 9: Defending Against Virus Attacks
Chapter 10: Defending against Trojan Horses, Spyware, and Adware
Chapter 11: Security Policies
Chapter 12: Assessing System Security
Chapter 13: Security Standards
Chapter 14: Physical Security and Disaster Recovery
Chapter 15: Techniques Used by Attackers
Chapter 16: Introduction to Forensics
Chapter 17: Cyber Terrorism
Appendix A: References

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program