Network defense and countermeasures principles and practices

Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces th...

Full description

Saved in:
Bibliographic Details
Main Author: Easttom, Chuck (Author)
Format: Book
Language:English
Published: Indianapolis, Indiana Pearson Education, Inc. 2018
Edition:Third edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 94921
003 MY-KLNDU
005 20241220004227.0
008 230529 20182018ii a 001 0 eng d
020 |a 9780789759962 (pbk) 
020 |a 0789759969 (pbk) 
039 9 |a 202401110919  |b rafizah  |c 202312281506  |d hainim  |y 202305290840  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a TK 5105.59 
090 |a TK 5105.59  |b .E26 2018 
100 1 |a Easttom, Chuck  |e author 
245 1 0 |a Network defense and countermeasures  |b principles and practices  |c Chuck Easttom 
250 |a Third edition 
264 1 |a Indianapolis, Indiana  |b Pearson Education, Inc.  |c 2018 
264 4 |a © 2018 
300 |a xxi, 522 pages  |b illustrations  |c 23 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. 
592 |a 00017209-23  |b 17/07/2023  |c RM351.49  |h Areesh Education and Trading Sdn Bhd 
650 0 |a Computer networks  |x Security measures 
999 |a vtls000105489  |c 94921  |d 94921