The Fictioning Horror Sale
 
 

Recently Viewed clear list


Original Essays | September 18, 2014

Lin Enger: IMG Knowing vs. Knowing



On a hot July evening years ago, my Toyota Tercel overheated on a flat stretch of highway north of Cedar Rapids, Iowa. A steam geyser shot up from... Continue »
  1. $17.47 Sale Hardcover add to wish list

    The High Divide

    Lin Enger 9781616203757

spacer
Qualifying orders ship free.
$73.60
List price: $80.00
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Partner Warehouse Internet- General

Network Defense and Countermeasures (2ND 14 Edition)

by

Network Defense and Countermeasures (2ND 14 Edition) Cover

 

Synopses & Reviews

Publisher Comments:

Network Defense and Countermeasures:

Principles and Practices

 

Everything you need to know about modern network attacks and defense, in one book

Clearly explains core network security concepts, challenges, technologies, and skills

Thoroughly updated for the latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a network security career

 

Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.

 

Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.

From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.

 

If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.

 

Chuck Easttom has worked in all aspects of IT, including network administration, software engineering, and IT management. For several years, he has taught IT topics in college and corporate environments, worked as an independent IT consultant, and served as an expert witness in court cases involving computers. He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. He served as subject matter expert for CompTIA in its development or revision of four certification tests, including Security+. He recently assisted the EC Council in developing its new advanced cryptography course. Easttom has authored 13 books on topics including computer security and crime.

 

Learn how to

  n  Understand essential network security concepts, challenges, and careers

  n  Learn how modern attacks work

  n  Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks

  n  Select the right security technologies for any network environment

  n  Use encryption to protect information

  n  Harden Windows and Linux systems and keep them patched

  n  Securely configure web browsers to resist attacks

  n  Defend against malware

  n  Define practical, enforceable security policies

  n  Use the “6 Ps” to assess technical and human aspects of system security

  n  Detect and fix system vulnerability

  n  Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula

  n  Ensure physical security and prepare for disaster recovery

  n  Know your enemy: learn basic hacking, and see how to counter it

  n  Understand standard forensic techniques and prepare for investigations of digital crime

 

Synopsis:

Network Defense and Countermeasures: Principles and Practices, Second Edition is the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with all practical skills essential to network defense.

 

Drawing on extensive experience as both an IT professional and instructor, Chuck Easttom offers exceptionally practical coverage of these and other core topics:

  • Firewalls
  • Intrusion detection systems
  • Operating system hardening
  • Defense against virus attacks, Trojan horses and spyware
  • Security policies, standards, and more

Unlike many other authors, however, he also fully addresses more specialized issues, from industrial espionage to cryptography (including public/private key systems, digital signatures, and certificates).

 

This edition has been extensively updated to reflect massive technology changes in all areas of IT security, from tools to attacks to best practice countermeasures. New topics include: physical security, disaster recovery, social engineering, and common hacking techniques.

About the Author

Chuck Easttom is a security consultant, author, and trainer. He has authored fourteen other books on programming, Web development, security, and Linux. Chuck holds more than 28 different industry certifications including CISSP, CEH, CHFI, ECSA, CIW Security Analyst, MCSE, MCSA, MCDBA, MCAD, Server+, and more. He has served as a subject matter expert for the Computer Technology Industry Association (CompTIA) in the development or revision of four of their certification tests, including the initial creation of their Security+ certification. He also developed the ECES cryptography certification for the EC Council. Chuck is a frequent guest speaker for computer groups, discussing computer security. You can reach Chuck at his website (www.chuckeasttom.com) or by email at chuck@chuckeasttom.com.

Table of Contents

1. Introduction to Network Security

2. Types of Attacks

3. Fundamentals of Firewalls

4. Practical Applications of Firewalls

5. Intrusion Detection Systems

6. Encryption Fundamentals

7. Virtual Private Networks

8. Operating System Hardening

9. Defending against Virus Attacks

10. Defending against Trojan Horses and Spyware

11. Security Policies

12. Assessing System Security

13. Security Standards

14. Physical Security and Disaster Recovery

15. Specific Techniques Used by Attackers

Appendix A: Security Resources

Appendix B: Terminology

Appendix C: Guide to Security Certifications

Product Details

ISBN:
9780789750945
Author:
Easttom
Publisher:
Exam Cram
Author:
Easttom, William (Chuck)
Author:
William (Chuck) Easttom II
Author:
Easttom, William (Chuck) II
Author:
Easttom, Chuck
Subject:
Internet - General
Subject:
Internet - Security
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; intenet; it security; about network; on network; i
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; it security; about network; on network; it securit
Subject:
network defense; countermeasures; cryptography; security policies; security assessments; security audits; physical security; social engineering; firewalls; intrusion detection; network security; security; it security; about network; on network; it securit
Copyright:
Edition Description:
Trade paper
Series:
Certification/Training
Publication Date:
20131028
Binding:
TRADE PAPER
Language:
English
Pages:
512
Dimensions:
9.19 x 6.98 x 1.07 in 773 gr

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » Security » General
Health and Self-Help » Self-Help » General

Network Defense and Countermeasures (2ND 14 Edition) New Trade Paper
0 stars - 0 reviews
$73.60 In Stock
Product details 512 pages Pearson It Certification - English 9780789750945 Reviews:
"Synopsis" by ,

Network Defense and Countermeasures: Principles and Practices, Second Edition is the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with all practical skills essential to network defense.

 

Drawing on extensive experience as both an IT professional and instructor, Chuck Easttom offers exceptionally practical coverage of these and other core topics:

  • Firewalls
  • Intrusion detection systems
  • Operating system hardening
  • Defense against virus attacks, Trojan horses and spyware
  • Security policies, standards, and more

Unlike many other authors, however, he also fully addresses more specialized issues, from industrial espionage to cryptography (including public/private key systems, digital signatures, and certificates).

 

This edition has been extensively updated to reflect massive technology changes in all areas of IT security, from tools to attacks to best practice countermeasures. New topics include: physical security, disaster recovery, social engineering, and common hacking techniques.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.