Book description
Network Defense and Countermeasures:
Principles and Practices
Everything you need to know about modern network attacks and defense, in one book
Clearly explains core network security concepts, challenges, technologies, and skills
Thoroughly updated for the latest attacks and countermeasures
The perfect beginner’s guide for anyone interested in a network security career
Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.
Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.
From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.
If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.
Chuck Easttom has worked in all aspects of IT, including network administration, software engineering, and IT management. For several years, he has taught IT topics in college and corporate environments, worked as an independent IT consultant, and served as an expert witness in court cases involving computers. He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. He served as subject matter expert for CompTIA in its development or revision of four certification tests, including Security+. He recently assisted the EC Council in developing its new advanced cryptography course. Easttom has authored 13 books on topics including computer security and crime.
Learn how to
n Understand essential network security concepts, challenges, and careers
n Learn how modern attacks work
n Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks
n Select the right security technologies for any network environment
n Use encryption to protect information
n Harden Windows and Linux systems and keep them patched
n Securely configure web browsers to resist attacks
n Defend against malware
n Define practical, enforceable security policies
n Use the “6 Ps” to assess technical and human aspects of system security
n Detect and fix system vulnerability
n Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula
n Ensure physical security and prepare for disaster recovery
n Know your enemy: learn basic hacking, and see how to counter it
n Understand standard forensic techniques and prepare for investigations of digital crime
Table of contents
- About This eBook
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Author
- Dedication
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Preface
-
Chapter 1. Introduction to Network Security
- Introduction
- The Basics of a Network
- Basic Network Utilities
- The OSI Model
- What Does This Mean for Security?
- Assessing Likely Threats to the Network
- Classifications of Threats
- Likely Attacks
- Threat Assessment
- Understanding Security Terminology
- Choosing a Network Security Approach
- Network Security and the Law
- Using Security Resources
- Summary
- Test Your Skills
- Chapter 2. Types of Attacks
- Chapter 3. Fundamentals of Firewalls
- Chapter 4. Firewall Practical Applications
- Chapter 5. Intrusion-Detection Systems
- Chapter 6. Encryption Fundamentals
- Chapter 7. Virtual Private Networks
- Chapter 8. Operating System Hardening
- Chapter 9. Defending Against Virus Attacks
- Chapter 10. Defending Against Trojan Horses, Spyware, and Adware
- Chapter 11. Security Policies
- Chapter 12. Assessing System Security
- Chapter 13. Security Standards
- Chapter 14. Physical Security and Disaster Recovery
- Chapter 15. Techniques Used by Attackers
- Chapter 16. Introduction to Forensics
- Chapter 17. Cyber Terrorism
- Appendix A. References
- Glossary
- Index
Product information
- Title: Network Defense and Countermeasures: Principles and Practices, Second Edition
- Author(s):
- Release date: October 2013
- Publisher(s): Pearson IT Certification
- ISBN: 9780133384390
You might also like
book
Network Defense and Countermeasures: Principles and Practices, 3rd Edition
All you need to know about defending networks, in one book · Clearly explains concepts, terminology, …
book
Network Defense and Countermeasures: Principles and Practices, 4th Edition
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, …
book
Information Security: Principles and Practices, Second Edition
Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …