Network Security A Beginner's Guide, Third Edition

  • ISBN13:


  • ISBN10:


  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2012-10-16
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $40.00 Save up to $28.00
  • Rent Book $12.00
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?


Tap into network security smarts for the self-guided IT professional! Filled with invaluable lessons that it took the author years to learn, Network Security: A Beginner's Guide, Third Editionprovides you with a thorough overview of network security, reinforced by sophisticated insider tips, best practices, and experienced practitioner know-how. You'll build a rock-solid foundation in understanding and defending networksfrom the most effective tools and resources to tested techniques for detecting even the most elusive vulnerabilities, as well as assessing proven threats. This complete yet concise guide is divided into four parts. Part 1: Information Security Basics covers the foundations of network security, types of attacks, hacker techniques, and information security services. Part II: Groundwork covers legal issues in information security, policy, managing risk, information security process, and best practices. Part III: Security Technologies covers firewalls, virtual private networks, encryption, and intrusion detection. Part IV: Practical Applications and Platform-Specific Implementations covers Unix security issues, Windows server security issues, internet architectures, e-commerce security, and mobile and wireless security. Inside, you'll find: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience Budget NoteTips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work

Table of Contents

Part I: Informaiton Security Basics

1 What is Information Security?
2 Types of Attacks
3 Hacker Techniques
4 Information Security Services

Part II: Ground Work

5 Policy
6 Managing Risk
7 Information Security Process
8 Information Security Best Practices & Drivers

Part III: Network Security Technology

9 Perimeter Technology
10 Monitoring Technology
11 Encryption Technology

Rewards Program

Write a Review