SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Network Defense and Countermeasures - Principles and Practices

Network Defense and Countermeasures - Principles and Practices, 4. udgave

Network Defense and Countermeasures

Principles and Practices
William Easttom
(2024)
Sprog: Engelsk
Pearson Education, Limited
662,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 15 hverdage

Detaljer om varen

  • 4. Udgave
  • Paperback: 624 sider
  • Udgiver: Pearson Education, Limited (April 2024)
  • ISBN: 9780138200589

All you need to know about defending networks, in one book

  • Clearly explains concepts, terminology, challenges, tools, and skills
  • Covers key security standards and models for business and government
  • The perfect introduction for all network/computer security professionals and students

Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned--in the classroom and in your career.

LEARN HOW TO

  • Evaluate key network risks and dangers
  • Choose the right network security approach for your organization
  • Anticipate and counter widespread network attacks, including those based on "social engineering"
  • Successfully deploy and apply firewalls and intrusion detection systems
  • Secure network communication with virtual private networks
  • Protect data with cryptographic public/private key systems, digital signatures, and certificates
  • Defend against malware, including ransomware, Trojan horses, and spyware
  • Harden operating systems and keep their security up to date
  • Define and implement security policies that reduce risk
  • Explore leading security standards and models, including ISO and NIST standards
  • Prepare for an investigation if your network has been attacked
  • Understand the growing risks of espionage and cyberterrorism
Preface xxiii
Chapter 1: Introduction to Network Security 2 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 2 The Basics of a Network..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 3 Basic Network Utilities..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 11 The OSI Model..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 15 What Does This Mean for Security?.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 16 Assessing Likely Threats to the Network.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 16 Classifications of Threats..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 20 Likely Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 24 Threat Assessment..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 25 Understanding Security Terminology..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 26 Choosing a Network Security Approach..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 30 Network Security and the Law..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 32 Using Security Resources.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 34 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 35 Endnotes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 35
Chapter 2: Types of Attacks 42 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 42 Understanding Denial of Service Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 43 Defending Against Buffer Overflow Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 63 Defending Against IP Spoofing.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 64 Defending Against Session Hijacking..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 66 Blocking Virus and Trojan Horse Attacks.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 66 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 75 Endnotes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 75
Chapter 3: Fundamentals of Firewalls 82 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 82 What Is a Firewall?.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 83 Implementing Firewalls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 90 Firewall Deployment..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 95 Selecting and Using a Firewall..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 96 Using Proxy Servers..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 97 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 99
Chapter 4: Firewall Practical Applications 106 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 106 Using Single Machine Firewalls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 107 Windows 10 Firewall..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 108 User Account Control..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 110 Linux Firewalls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 110 Using Small Office/Home Office Firewalls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 118 Using Medium-Sized Network Firewalls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 121 Using Enterprise Firewalls.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 124 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 125 Endnotes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 125
Chapter 5: Intrusion-Detection Systems 132 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 132 Understanding IDS Concepts..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 133 IDS Components and Processes..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 135 SIEM..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 136 Evasion Techniques..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 137 Understanding and Implementing IDSs..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 138 Understanding and Implementing Honeypots.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 141 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 146
Chapter 6: Encryption Fundamentals 152 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 152 The History of Encryption..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 153 Learning About Modern Encryption Methods..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 160 Identifying Good Encryption..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 173 Understanding Digital Signatures and Certificates..
.
.
.
.
.
.
.
.
.
.
.
.
. 174 MAC and HMAC..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 179 Understanding and Using Decryption..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 179 Cracking Passwords..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 180 Steganography.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 184 Steganalysis..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 185 Quantum Computing and Quantum Cryptography.
.
.
.
.
.
.
.
.
.
.
.
.
. 186 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 187 Endnote..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 187
Chapter 7: Virtual Private Networks 194 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 194 Basic VPN Technology..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 195 Using VPN Protocols for VPN Encryption..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 197 IPsec..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 206 SSL/TLS..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 207 Other VPN Protocols..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 209 Implementing VPN Solutions..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 210 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 215 Endnotes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 215
Chapter 8: Operating System Hardening 222 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 222 Configuring Windows Properly..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 223 Configuring Linux Properly..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 244 Patching the Operating System..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 245 Configuring Browsers..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 246 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 253
Chapter 9: Defending Against Virus Attacks 260 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 260 Understanding Virus Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 261 Virus Scanners..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 270 Virus Scanning Techniques.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 272 When Antivirus Causes a Problem.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 274 Commercial Antivirus Software..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 274 Antivirus Policies and Procedures..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 283 Additional Methods for Defending Your System..
.
.
.
.
.
.
.
.
.
.
.
.
.
. 284 What to Do If Your System Is Infected by a Virus..
.
.
.
.
.
.
.
.
.
.
.
.
. 285 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 288 Endnotes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 288
Chapter 10: Defending Against Trojan Horses and Phishing 296 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 296 Trojan Horses..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 297 Phishing..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 307 Summary..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 313 Endnotes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 313
Chapter 11: Security Policies 318 Introduction..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 318 &nbs
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Fysisk eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.