Network Defense and Countermeasures

Principles and Practices

Nonfiction, Computers, Application Software, Computer Security, Networking & Communications
Cover of the book Network Defense and Countermeasures by William (Chuck) Easttom II, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William (Chuck) Easttom II ISBN: 9780134893099
Publisher: Pearson Education Publication: April 3, 2018
Imprint: Pearson IT Certification Language: English
Author: William (Chuck) Easttom II
ISBN: 9780134893099
Publisher: Pearson Education
Publication: April 3, 2018
Imprint: Pearson IT Certification
Language: English

All you need to know about defending networks, in one book

·         Clearly explains concepts, terminology, challenges, tools, and skills

·         Covers key security standards and models for business and government

·         The perfect introduction for all network/computer security professionals and students

Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.

** **

Learn How To

·         Evaluate key network risks and dangers

·         Choose the right network security approach for your organization

·         Anticipate and counter widespread network attacks, including those based on “social engineering”

·         Successfully deploy and apply firewalls and intrusion detection systems

·         Secure network communication with virtual private networks

·         Protect data with cryptographic public/private key systems, digital signatures, and certificates

·         Defend against malware, including ransomware, Trojan horses, and spyware

·         Harden operating systems and keep their security up to date

·         Define and implement security policies that reduce risk

·         Explore leading security standards and models, including ISO and NIST standards

·         Prepare for an investigation if your network has been attacked

·         Understand the growing risks of espionage and cyberterrorism

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

All you need to know about defending networks, in one book

·         Clearly explains concepts, terminology, challenges, tools, and skills

·         Covers key security standards and models for business and government

·         The perfect introduction for all network/computer security professionals and students

Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.

** **

Learn How To

·         Evaluate key network risks and dangers

·         Choose the right network security approach for your organization

·         Anticipate and counter widespread network attacks, including those based on “social engineering”

·         Successfully deploy and apply firewalls and intrusion detection systems

·         Secure network communication with virtual private networks

·         Protect data with cryptographic public/private key systems, digital signatures, and certificates

·         Defend against malware, including ransomware, Trojan horses, and spyware

·         Harden operating systems and keep their security up to date

·         Define and implement security policies that reduce risk

·         Explore leading security standards and models, including ISO and NIST standards

·         Prepare for an investigation if your network has been attacked

·         Understand the growing risks of espionage and cyberterrorism

 

More books from Pearson Education

Cover of the book Apple Training Series by William (Chuck) Easttom II
Cover of the book Opting In by William (Chuck) Easttom II
Cover of the book A Programmer's Guide to Java Certification by William (Chuck) Easttom II
Cover of the book Sams Teach Yourself Tumblr in 10 Minutes by William (Chuck) Easttom II
Cover of the book Level 2: Tales from Hans Andersen by William (Chuck) Easttom II
Cover of the book Adobe Lightroom 3 on Demand by William (Chuck) Easttom II
Cover of the book Building Database Clouds in Oracle 12c by William (Chuck) Easttom II
Cover of the book CompTIA A+ 220-901 and 220-902 Cert Guide by William (Chuck) Easttom II
Cover of the book Pure JavaScript by William (Chuck) Easttom II
Cover of the book Learning iCloud Data Management by William (Chuck) Easttom II
Cover of the book Presentations in Action by William (Chuck) Easttom II
Cover of the book Exam Ref 70-761 Querying Data with Transact-SQL by William (Chuck) Easttom II
Cover of the book Pay As You Wish Pricing by William (Chuck) Easttom II
Cover of the book The New Commodity Trading Guide by William (Chuck) Easttom II
Cover of the book Using Microsoft Windows 7 by William (Chuck) Easttom II
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy