- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Other titles in the Certification/Training series:
Network Defense and Countermeasures (2ND 14 Edition)by Easttom
Synopses & Reviews
Network Defense and Countermeasures:
Principles and Practices
Everything you need to know about modern network attacks and defense, in one book
Clearly explains core network security concepts, challenges, technologies, and skills
Thoroughly updated for the latest attacks and countermeasures
The perfect beginner’s guide for anyone interested in a network security career
Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.
Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.
From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.
If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.
Chuck Easttom has worked in all aspects of IT, including network administration, software engineering, and IT management. For several years, he has taught IT topics in college and corporate environments, worked as an independent IT consultant, and served as an expert witness in court cases involving computers. He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. He served as subject matter expert for CompTIA in its development or revision of four certification tests, including Security+. He recently assisted the EC Council in developing its new advanced cryptography course. Easttom has authored 13 books on topics including computer security and crime.
Learn how to
n Understand essential network security concepts, challenges, and careers
n Learn how modern attacks work
n Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks
n Select the right security technologies for any network environment
n Use encryption to protect information
n Harden Windows and Linux systems and keep them patched
n Securely configure web browsers to resist attacks
n Defend against malware
n Define practical, enforceable security policies
n Use the “6 Ps” to assess technical and human aspects of system security
n Detect and fix system vulnerability
n Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula
n Ensure physical security and prepare for disaster recovery
n Know your enemy: learn basic hacking, and see how to counter it
n Understand standard forensic techniques and prepare for investigations of digital crime
Network Defense and Countermeasures: Principles and Practices, Second Edition is the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with all practical skills essential to network defense.
Drawing on extensive experience as both an IT professional and instructor, Chuck Easttom offers exceptionally practical coverage of these and other core topics:
Unlike many other authors, however, he also fully addresses more specialized issues, from industrial espionage to cryptography (including public/private key systems, digital signatures, and certificates).
This edition has been extensively updated to reflect massive technology changes in all areas of IT security, from tools to attacks to best practice countermeasures. New topics include: physical security, disaster recovery, social engineering, and common hacking techniques.
About the Author
Chuck Easttom is a security consultant, author, and trainer. He has authored fourteen other books on programming, Web development, security, and Linux. Chuck holds more than 28 different industry certifications including CISSP, CEH, CHFI, ECSA, CIW Security Analyst, MCSE, MCSA, MCDBA, MCAD, Server+, and more. He has served as a subject matter expert for the Computer Technology Industry Association (CompTIA) in the development or revision of four of their certification tests, including the initial creation of their Security+ certification. He also developed the ECES cryptography certification for the EC Council. Chuck is a frequent guest speaker for computer groups, discussing computer security. You can reach Chuck at his website (www.chuckeasttom.com) or by email at firstname.lastname@example.org.
Table of Contents
1. Introduction to Network Security
2. Types of Attacks
3. Fundamentals of Firewalls
4. Practical Applications of Firewalls
5. Intrusion Detection Systems
6. Encryption Fundamentals
7. Virtual Private Networks
8. Operating System Hardening
9. Defending against Virus Attacks
10. Defending against Trojan Horses and Spyware
11. Security Policies
12. Assessing System Security
13. Security Standards
14. Physical Security and Disaster Recovery
15. Specific Techniques Used by Attackers
Appendix A: Security Resources
Appendix B: Terminology
Appendix C: Guide to Security Certifications
What Our Readers Are Saying
Computers and Internet » Computers Reference » General