Network Security Bible, 2nd Edition

  • 17h 49m
  • Eric Cole
  • John Wiley & Sons (US)
  • 2009

The comprehensive A-to-Z guide on network security, fully revised and updated

Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.

Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.

  • Covers all core areas of network security and how they interrelate
  • Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide
  • Examines new trends and best practices in use by organizations to secure their enterprises
  • Features additional chapters on areas related to data protection/correlation and forensics
  • Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats

If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.

About the Author

Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.

In this Book

  • Introduction
  • State of Network Security
  • New Approaches to Cyber Security
  • Interfacing with the Organization
  • Information System Security Principles
  • Information System Security Management
  • Access Control
  • Attacks and Threats
  • Windows Security
  • UNIX and Linux Security
  • Web Browser and Client Security
  • Web Security
  • Electronic Mail (E-Mail) Security
  • Domain Name System
  • Server Security
  • Network Protocols
  • Wireless Security
  • Network Architecture Fundamentals
  • Firewalls
  • Intrusion Detection/Prevention
  • Secret Communication
  • Covert Communication
  • Applications of Secure/Covert Communication
  • Intrusion Detection and Response
  • Digital Forensics
  • Security Assessments, Testing, and Evaluation
  • Validating Your Security
  • Data Protection
  • Putting Everything Together
  • The Future
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)