12/10/2023 0 Comments Inform it![]() ![]() Learn more and start a free Safari trial. We are also proud to be a part of Safari, a digital library subscription service. Products found on InformIT come from the family of information technology publishers and brands of Pearson, the world’s largest learning company. Our editors are active participants in IT communities, and are always looking to publish on the topics that matter most to application and software developers and designers, programmers, system administrators, hobbyists, and IT professionals. Our passion is delivering trusted and quality content and resources from the authors, creators, innovators, and leaders of technology and business from the best imprints in IT including Addison-Wesley, Cisco Press, Microsoft Press, and Pearson IT Certification, among others. InformIT is your one-stop technology learning resource. Important Standards.العربية (Arabic ) Name of Publishing House 288Ĭhapter 10: Defending Against Trojan Horses and Phishing 296 What to Do If Your System Is Infected by a Virus. 283Īdditional Methods for Defending Your System. 253Ĭhapter 9: Defending Against Virus Attacks 260 215Ĭhapter 8: Operating System Hardening 222 Quantum Computing and Quantum Cryptography. Understanding Digital Signatures and Certificates. Learning About Modern Encryption Methods. Understanding and Implementing Honeypots. 125Ĭhapter 5: Intrusion-Detection Systems 132 Using Small Office/Home Office Firewalls. 99Ĭhapter 4: Firewall Practical Applications 106 66īlocking Virus and Trojan Horse Attacks. 43ĭefending Against Buffer Overflow Attacks. 16Īssessing Likely Threats to the Network. Understand the growing risks of espionage and cyberterrorismĬhapter 1: Introduction to Network Security 2.Prepare for an investigation if your network has been attacked.Explore leading security standards and models, including ISO and NIST standards.Define and implement security policies that reduce risk.Harden operating systems and keep their security up to date.Defend against malware, including ransomware, Trojan horses, and spyware.Protect data with cryptographic public/private key systems, digital signatures, and certificates.Secure network communication with virtual private networks.Successfully deploy and apply firewalls and intrusion detection systems.Anticipate and counter widespread network attacks, including those based on social engineering.Choose the right network security approach for your organization.In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what youve learnedin the classroom and in your career. Throughout, Easttom blends theory and application, helping you understand both what to do and why. Youll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Youll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. Next, he shows how encryption can be used to safeguard data as it moves across networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions youll need to be effective.Įasttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. All you need to know about defending networks, in one bookĬlearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to todays most useful and practical introduction to defending modern networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |