Summer Reading B2G1 Free
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Original Essays | July 14, 2015

    Joshua Mohr: IMG Your Imagination, Your Fingerprint



    When I was in grad school, a teacher told our workshop that if a published novel is 300 pages, the writer had to generate 1,200 along the way. I... Continue »
    1. $17.50 Sale Hardcover add to wish list

      All This Life

      Joshua Mohr 9781593766030

    spacer
Qualifying orders ship free.
$70.75
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- General

Network Security: A Practical Approach

by

Network Security: A Practical Approach Cover

 

Synopses & Reviews

Publisher Comments:

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.

You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.

+ Helps you see through a hacker's eyes so you can make your network more secure.

+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.

+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.

+ Covers techniques for enhancing the physical security of your systems and network.

+ Explains how hackers use information-gathering to find and exploit security flaws.

+ Examines the most effective ways to prevent hackers from gaining root access to a server.

+ Addresses Denial of Service attacks, "malware," and spoofing.

+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

Synopsis:

Filling the need for a single source that introduces all the important network security areas from a practical perspective, this volume covers technical issues, such as defenses against software attacks by system crackers, as well as administrative topics, such as formulating a security policy. The bestselling author's writing style is highly accessible and takes a vendor-neutral approach.

Synopsis:

This book covers the necessary conceptual background to help both the administrator and practioner to make informed choices about the best security solution for their environments. Coverage includes technical issues such as defenses against software attacks by system crackers as well as administrative topics such as formulating a security policy. Discussion of security topics takes a vendor-neutral approach. Each chapter includes a hands-on element to help readers understand key issues related implementing security measures.

Synopsis:

College, where she teachers Internet security, object-oriented programming in Java and C++, database management, data communications, and computer architecture.

About the Author

Jan L. Harrington, the author of 30 books, including SQL, Clearly Explained (Academic Press), has been writing about databases since 1984. She is a professor and chair of the department of computer science and information systems at Marist College, where she teaches database design and management, object-oriented programming, data communications, and computer architecture.

Professor and Department Chair, Computer Science, Marist College, Hyde Park, New York, U.S.A.

Table of Contents

Chapter 1: In the Beginning

Chapter 2: Basic Security Architecture

Chapter 3: Physical Security

Chapter 4: Information Gathering

Chapter 5: Gaining and Keeping Root Access

Chapter 6: Spoofing

Chapter 7: Denial of Service Attacks

Chapter 8: Malware

Chapter 9: User and Password Security

Chapter 10: Remote Access

Chapter 11: Wireless Security

Chapter 12: Encryption

Appendix A: The TCP/IP Protocol Stack

Appendix B: TCP and UDP Ports

Appendix C: Security Update Sites

Glossary

Index

Product Details

ISBN:
9780123116338
Author:
Harrington, Jan
Publisher:
Morgan Kaufmann Publishers
Author:
Harrington, Jan L.
Subject:
Networking - General
Subject:
Computer networks
Subject:
Security
Subject:
Security measures
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Series:
The Morgan Kaufmann Series in Networking
Publication Date:
20050231
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
384
Dimensions:
9.25 x 7.5 in

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General
Engineering » Engineering » General Engineering
Health and Self-Help » Health and Medicine » Medical Specialties

Network Security: A Practical Approach New Trade Paper
0 stars - 0 reviews
$70.75 In Stock
Product details 384 pages Morgan Kaufmann Publishers - English 9780123116338 Reviews:
"Synopsis" by , Filling the need for a single source that introduces all the important network security areas from a practical perspective, this volume covers technical issues, such as defenses against software attacks by system crackers, as well as administrative topics, such as formulating a security policy. The bestselling author's writing style is highly accessible and takes a vendor-neutral approach.
"Synopsis" by , This book covers the necessary conceptual background to help both the administrator and practioner to make informed choices about the best security solution for their environments. Coverage includes technical issues such as defenses against software attacks by system crackers as well as administrative topics such as formulating a security policy. Discussion of security topics takes a vendor-neutral approach. Each chapter includes a hands-on element to help readers understand key issues related implementing security measures.

"Synopsis" by , College, where she teachers Internet security, object-oriented programming in Java and C++, database management, data communications, and computer architecture.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.