 
    All you need to know about defending networks, in one book
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned—in the classroom and in your career.
LEARN HOW TO
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Dr. Chuck Easttom is the author of 41 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for Vanderbilt University.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Devils in the Detail Ltd, Oxford, Regno Unito
Condizione: Very Good. Picture Shown is For Illustration Purposes Only, Please See Below For Further DetailsCONDITION ? VERY GOOD - PAPERBACKlight wear and scuff marks to cover, pages in nice condition, shipped from the UK. Codice articolo 443/BT/960P 0589
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Good. 4. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Codice articolo 0138200580-11-1
Quantità: 1 disponibili
Da: A Team Books, Conway, AR, U.S.A.
paperback. Condizione: Good. Used books may not include access codes or one time use codes. Proven Seller with Excellent Customer Service. Choose expedited shipping and get it FAST. Codice articolo sun0000039838
Quantità: 2 disponibili
Da: A Team Books, Conway, AR, U.S.A.
paperback. Condizione: Acceptable. Used books may not include access codes or one time use codes. Proven Seller with Excellent Customer Service. Choose expedited shipping and get it FAST. Codice articolo sun0000039837
Quantità: 1 disponibili
Da: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condizione: New. 4th Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 009223251N
Quantità: 6 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 45733348-n
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 45733348
Quantità: Più di 20 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo GB-9780138200589
Quantità: 2 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo GB-9780138200589
Quantità: 2 disponibili
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, tools, and skillsCovers key security standards and models for business and governmentThe perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learnedin the classroom and in your career. LEARN HOW TO Evaluate key network risks and dangersChoose the right network security approach for your organizationAnticipate and counter widespread network attacks, including those based on "social engineering"Successfully deploy and apply firewalls and intrusion detection systemsSecure network communication with virtual private networksProtect data with cryptographic public/private key systems, digital signatures, and certificatesDefend against malware, including ransomware, Trojan horses, and spywareHarden operating systems and keep their security up to dateDefine and implement security policies that reduce riskExplore leading security standards and models, including ISO and NIST standardsPrepare for an investigation if your network has been attackedUnderstand the growing risks of espionage and cyberterrorism Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Codice articolo 9780138200589
Quantità: 1 disponibili