Autor: Eric Cole
Wydawca: Wiley
Dostępność: 3-6 tygodni
Cena: 304,50 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780470502495 |
ISBN10: |
0470502495 |
Autor: |
Eric Cole |
Oprawa: |
Paperback |
Rok Wydania: |
2009-09-08 |
Numer Wydania: |
2nd Edition |
Ilość stron: |
936 |
Wymiary: |
233x188 |
Tematy: |
UT |
Complements your Cisco Academy course instruction in networking security!
Network Security Bible
Second Edition
Eric Cole
Understand the changing security landscape
Learn the latest approaches and best practices
Secure your enterprise and data worldwide
The book you need to succeed!
If you′re in charge of network security, you need this book
Since the first edition of this comprehensive guide, cyber threats have increased, the stakes have gotten higher, and what is considered state of the art security has evolved. This packed new edition, thoroughly revised to cover the very latest techniques, is the detailed wall–to–wall resource you need to keep your network secure. Understand the changing threats, find out what defense in depth means and why you need it, learn best practices, and take control with this must–have book.
Understand current threats and attacks and how they succeed
Answer 30 critical questions and see how your network security is today
Consider mission resilience and make sure your critical functions survive
Master crypto, steganography, VPN, and other covert communications
Learn effective techniques for Windows®, Linux®, browser, e–mail, and wireless security
Explore the basics of digital forensics, including evidence preservation
Do risk analysis, make a global plan, and prepare for business continuity and recovery
Spis treści:
Introduction.
Part I: Network Security Landscape.
Chapter 1: State of Network Security.
Chapter 2: New Approaches to Cyber Security.
Chapter3: InterfacingwiththeOrganization.
Part II: Security Principles and Practices.
Chapter 4: Information System Security Principles.
Chapter 5: Information System Security Management.
Chapter 6: Access Control.
Chapter 7: Attacks and Threats.
Part III: Operati
ng Systems and Applications.
Chapter 8: Windows Security.
Chapter 9: UNIX and Linux Security.
Chapter 10: Web Browser and Client Security.
Chapter 11: Web Security.
Chapter 12: Electronic mail (E–mail) Security.
Chapter13:DomainName System.
Chapter 14: Server Security.
Part IV: Network Security Fundamentals.
Chapter15:NetworkProtocols.
Chapter 16: Wireless Security.
Chapter17:NetworkArchitecture Fundamentals.
Chapter18: Firewalls.
Chapter 19: Intrusion Detection/Prevention.
Part V: Communication.
Chapter 20: Secret Communication.
Chapter21:CovertCommunication.
Chapter 22: Applications of Secure/Covert Communication.
Part VI: The Security Threat and Response.
Chapter23: IntrusionDetection andResponse.
Chapter 25: Security Assessments, Testing, and Evaluation.
Part VII: Integrated Cyber Security.
Chapter 26: Validating Your Security.
Chapter27:DataProtection.
Chapter 28: Putting Everything Together.
Chapter29:The Future.
Index.
Nota biograficzna:
Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.
Okładka tylna:
Complements your Cisco Academy course instruction in networking security!
Network Security Bible
Second Edition
Eric Cole
Understand the changing security landscape
Learn the latest approaches and best practices
Secure your enterprise and data worldwide
The book you need to succeed!
If you′re in charge of network security, you need this book
Since the first edition of this comprehensive guide, cyber threats
have increased, the stakes have gotten higher, and what is considered state of the art security has evolved. This packed new edition, thoroughly revised to cover the very latest techniques, is the detailed wall–to–wall resource you need to keep your network secure. Understand the changing threats, find out what defense in depth means and why you need it, learn best practices, and take control with this must–have book.
Understand current threats and attacks and how they succeed
Answer 30 critical questions and see how your network security is today
Consider mission resilience and make sure your critical functions survive
Master crypto, steganography, VPN, and other covert communications
Learn effective techniques for Windows®, Linux®, browser, e–mail, and wireless security
Explore the basics of digital forensics, including evidence preservation
Do risk analysis, make a global plan, and prepare for business continuity and recovery
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy