- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
This item may be
Check for Availability
Other titles in the Mastering series:
Mastering Network Security 2e (Mastering)
Synopses & Reviews
The Technology You Need is Out There. The Expertise You Need is inHere.
Expertise is what makes hackers effective.It’s what will make you effective, too, as you fight to keep them at bay.Mastering Network Security has been fully updated to reflect the latestdevelopments in security technology, but it does much more than bring you up todate. More importantly, it gives you a comprehensive understanding of the threatsto your organization’s network and teaches you a systematic approach inwhich you make optimal use of the technologies available to you. Coverageincludes:
Security is the hottest topic in IT, as well as everywhere else. The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security information grows. This new edition of the highly acclaimed and best-selling Mastering Network Security provides a systematic and practical approach to assessing threats to the network and implementing workable and effective security measures to avert them. Coverage ranges from physical network security to data theft and viruses.
About the Author
Chris Brenton is the author of several Sybex books, including Mastering Cisco Routers. Brenton is a network consultant specializing in implementing network security and troubleshooting multiprotocol environments. Cameron Hunt is a network consultant and trainer.
Table of Contents
Chapter 1: A Systems Analysis Approach to Information Technology.
Chapter 2: Security as a Process.
Chapter 3: Understanding How Network Systems Communicate.
Chapter 4: Topology Security.
Chapter 5: Firewalls.
Chapter 6: Cisco?s PIX Firewall.
Chapter 7: Intrusion Detection Systems.
Chapter 8: Authentication and Encryption.
Chapter 9: Virtual Private Networking.
Chapter 10: Viruses, Trojans, and Worms.
Chapter 11: Disaster Prevention and Recovery.
Chapter 12: The Wide World of Windows.
Chapter 13: Unix-Based Systems.
Chapter 14: The Anatomy ofan Attack.
Chapter 15: Security Resources.
Appendix A: Operating System Security Checklists.
Appendix B: Sample Network Usage Policy.
What Our Readers Are Saying