Book description
Network Security first-step
Second Edition
Tom Thomas and Donald Stoddard
Your first step into the world of network security
No security experience required
Includes clear and easily understood explanations
Makes learning easy
Your first step to network security begins here!
Learn how hacker attacks work, from start to finish
Choose the right security solution for each type of risk
Create clear and enforceable security policies, and keep them up to date
Establish reliable processes for responding to security advisories
Use encryption effectively, and recognize its limitations
Secure your network with firewalls, routers, and other devices
Prevent attacks aimed at wireless networks
No security experience required!
Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.
Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you!
Table of contents
- Title Page
- Copyright Page
- About the Authors
- About the Technical Reviewers
- Dedications
- Acknowledgments
- Contents at a Glance
- Contents
- Icons
- Introduction
-
Chapter 1. There Be Hackers Here!
- Essentials First: Looking for a Target
- Hacking Motivations
- Targets of Opportunity
- Targets of Choice
- The Process of an Attack
- Where Are Attacks Coming From?
- Common Vulnerabilities, Threats, and Risks
- Overview of Common Attacks and Exploits
- Network Security Organizations
- Chapter Summary
- Chapter Review
- Chapter 2. Security Policies
- Chapter 3. Processes and Procedures
- Chapter 4. Network Security Standards and Guidelines
-
Chapter 5. Overview of Security Technologies
- Security First Design Concepts
- Packet Filtering via ACLs
- Stateful Packet Inspection
- Network Address Translation (NAT)
- Proxies and Application-Level Protection
- Content Filters
- Public Key Infrastructure
- Reputation-Based Security
- AAA Technologies
- Two-Factor Authentication/Multifactor Authentication
- Chapter Summary
- Chapter Review Questions
- Chapter 6. Security Protocols
- Chapter 7. Firewalls
- Chapter 8. Router Security
-
Chapter 9. IPsec Virtual Private Networks (VPNs)
- Analogy: VPNs Securely Connect Is LAN ds
- VPN Overview
- Overview of IPsec VPNs
- Router Configuration as VPN Peer
- Firewall VPN Configuration for Client Access
- SSL VPN Overview
- Comparing SSL and IPsec VPNs
- Which to Deploy: Choosing Between IPsec and SSL VPNs
- Remote-Access VPN Security Considerations
- Chapter Summary
- Chapter Review Questions
- Chapter 10. Wireless Security
- Chapter 11. Intrusion Detection and Honeypots
- Chapter 12. Tools of the Trade
- Appendix A. Answers to Review Questions
- Index
Product information
- Title: Network Security First-Step, Second Edition
- Author(s):
- Release date: December 2011
- Publisher(s): Cisco Press
- ISBN: 9781587204142
You might also like
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Network Security Fundamentals
An introduction to the key tools and technologies used to secure network access Examine common security …
book
Wireless Network Security A Beginner's Guide
Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning …
book
Assessing Network Security
Help beat the hackers at their own game! Discover how to take charge of system assets …