Buy 2, Get 1 Free Used Book Sale. Enter code BUYUSED at checkout
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Award Winners
    • Signed Preorders
    • Signed Editions
    • Digital Audio Books
    • Daily Dose
    • Newsletters
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Month
    • Staff Top Fives 2017
    • Boox
    • Indiespensable
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
  • Gifts + Gift Cards
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Read Rise Resist Gear
    • Journals & Notebooks
    • Games
    • Socks
  • Sell Books
    • Sell Books Online
    • Sell Books in Our Stores
  • Blog
  • Events
  • Find A Store
McAfee Secure

Don't Miss

  • Used Books: Buy 2, Get 1 Free!
  • BOOX #8: Cycle City
  • Indiespensable #73:
    The Mars Room
  • Kids' Robots!
  • National Poetry Month
  • Short Stories Sale
  • Spring B2G1 Free Sale
  • Live at Powell's: Spring Events
  • Libro.fm Audiobooks

Visit Our Stores


Wendy Gorton: Powell's Q&A: Wendy Gorton, Author of '50 Hikes With Kids: Oregon and Washington' (0 comment)
My very first book, 50 Hikes With Kids: Oregon and Washington, is a handpicked selection of the most kid-friendly hikes in the region....
Read More»
  • Lucy Cooke: Aping Man (0 comment)
  • John Scalzi: 'Head On' (0 comment)

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Network Security: A Practical Approach

by Jan L. Harrington
Network Security: A Practical Approach

  • Comment on this title and you could win!
  • Synopses & Reviews

ISBN13: 9780123116338
ISBN10: 0123116333



All Product Details

View Larger ImageView Larger Images
$85.27
New Trade Paperback
Ships in 1 to 3 days
Add to Cart
Add to Wishlist
QtyStore
20Remote Warehouse

Synopses & Reviews

Publisher Comments

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.

You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.

+ Helps you see through a hacker's eyes so you can make your network more secure.

+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.

+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.

+ Covers techniques for enhancing the physical security of your systems and network.

+ Explains how hackers use information-gathering to find and exploit security flaws.

+ Examines the most effective ways to prevent hackers from gaining root access to a server.

+ Addresses Denial of Service attacks, "malware," and spoofing.

+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

Synopsis

Filling the need for a single source that introduces all the important network security areas from a practical perspective, this volume covers technical issues, such as defenses against software attacks by system crackers, as well as administrative topics, such as formulating a security policy. The bestselling author's writing style is highly accessible and takes a vendor-neutral approach.

Synopsis

Fills the need for a single source that introduces all of the important network security areas.

Synopsis

ervers since the mid-1980s, when she first operated an Internet-connected AT&T 3B2. Dr. Harrington is a full-time faculty member and chair of the Department of Computer Science and Information Systems at Marist College, where she teachers Internet security, object-oriented programming in Java and C++, database management, data communications, and computer architecture.

Synopsis

++, database management, data communications, and computer architecture.

Synopsis

College, where she teachers Internet security, object-oriented programming in Java and C++, database management, data communications, and computer architecture.

Synopsis

This book covers the necessary conceptual background to help both the administrator and practioner to make informed choices about the best security solution for their environments. Coverage includes technical issues such as defenses against software attacks by system crackers as well as administrative topics such as formulating a security policy. Discussion of security topics takes a vendor-neutral approach. Each chapter includes a hands-on element to help readers understand key issues related implementing security measures.


About the Author

Jan L. Harrington, the author of 30 books, including SQL, Clearly Explained (Academic Press), has been writing about databases since 1984. She is a professor and chair of the department of computer science and information systems at Marist College, where she teaches database design and management, object-oriented programming, data communications, and computer architecture.

Professor and Department Chair, Computer Science, Marist College, Hyde Park, New York, U.S.A.


Table of Contents

Chapter 1: In the Beginning

Chapter 2: Basic Security Architecture

Chapter 3: Physical Security

Chapter 4: Information Gathering

Chapter 5: Gaining and Keeping Root Access

Chapter 6: Spoofing

Chapter 7: Denial of Service Attacks

Chapter 8: Malware

Chapter 9: User and Password Security

Chapter 10: Remote Access

Chapter 11: Wireless Security

Chapter 12: Encryption

Appendix A: The TCP/IP Protocol Stack

Appendix B: TCP and UDP Ports

Appendix C: Security Update Sites

Glossary

Index


What Our Readers Are Saying

Be the first to share your thoughts on this title!




Product Details

ISBN:
9780123116338
Binding:
Trade Paperback
Publication date:
02/01/2005
Publisher:
Morgan Kaufmann Publishers
Language:
English
Pages:
365
Height:
.90IN
Width:
7.46IN
LCCN:
2005040077
Series:
The Morgan Kaufmann Series in Networking
Number of Units:
1
Illustration:
Yes
UPC Code:
2800123116330
Author:
Jan Harrington
Author:
Jan L. Harrington
Subject:
Computer networks
Subject:
Security measures
Subject:
Computer networks -- Security measures.

Ships free on qualified orders.
Add to Cart
$85.27
New Trade Paperback
Ships in 1 to 3 days
Add to Wishlist
QtyStore
20Remote Warehouse
Used Book Alert for book Receive an email when this ISBN is available used.
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Tumblr
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Newsletters
  • Sitemap
  • © 2018 POWELLS.COM Terms
  • 800-878-7323

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##