Chuck Easttom is CEO and Chief Trainer for CEC-Security, which specializes in IT security training and CISP and Security+ exam preparation.
Meer over William EasttomNetwork Defense and Countermeasures
Principles and Practices
Paperback Engels 2023 4e druk 9780138200589Samenvatting
All you need to know about defending networks, in one book
- Clearly explains concepts, terminology, challenges, tools, and skills
- Covers key security standards and models for business and government
- The perfect introduction for all network/computer security professionals and students
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learnedin the classroom and in your career.
LEARN HOW TO:
- Evaluate key network risks and dangers
- Choose the right network security approach for your organization
- Anticipate and counter widespread network attacks, including those based on "social engineering"
- Successfully deploy and apply firewalls and intrusion detection systems
- Secure network communication with virtual private networks
- Protect data with cryptographic public/private key systems, digital signatures, and certificates
- Defend against malware, including ransomware, Trojan horses, and spyware
- Harden operating systems and keep their security up to date
- Define and implement security policies that reduce risk
- Explore leading security standards and models, including ISO and NIST standards
- Prepare for an investigation if your network has been attacked
- Understand the growing risks of espionage and cyberterrorism
Specificaties
Lezersrecensies
Inhoudsopgave
Chapter 1: Introduction to Network Security 2
Chapter 2: Types of Attacks 42
Chapter 3: Fundamentals of Firewalls 82
Chapter 4: Firewall Practical Applications 106
Chapter 5: Intrusion-Detection Systems 132
Chapter 6: Encryption Fundamentals 152
Chapter 7: Virtual Private Networks 194
Chapter 8: Operating System Hardening 222
Chapter 9: Defending Against Virus Attacks 260
Chapter 10: Defending Against Trojan Horses and Phishing 296
Chapter 11: Security Policies 318
Chapter 12: Assessing System Security 346
Chapter 13: Security Standards 394
Chapter 14: Physical Security and Disaster Recovery 422
Chapter 15: Techniques Used by Attackers 438
Chapter 16: Introduction to Forensics 466
Chapter 17: Cyber Warfare and Terrorism 504
Appendix A: Answers 530
Glossary 542
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan