SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Network Defense and Countermeasures - Principles and Practices

Network Defense and Countermeasures, 3. udgave
Søgbar e-bog

Network Defense and Countermeasures Vital Source e-bog

William (Chuck) Easttom II
(2018)
Pearson International
994,00 kr.
Leveres umiddelbart efter køb
Network Defense and Countermeasures, 3. udgave

Network Defense and Countermeasures Vital Source e-bog

William (Chuck) Easttom II
(2018)
Pearson International
422,00 kr.
Leveres umiddelbart efter køb
Network Defense and Countermeasures, 3. udgave

Network Defense and Countermeasures Vital Source e-bog

William (Chuck) Easttom II
(2018)
Pearson International
497,00 kr.
Leveres umiddelbart efter køb
Network Defense and Countermeasures, 3. udgave

Network Defense and Countermeasures Vital Source e-bog

William (Chuck) Easttom II
(2018)
Pearson International
348,00 kr.
Leveres umiddelbart efter køb
Network Defense and Countermeasures - Principles and Practices, 3. udgave

Network Defense and Countermeasures

Principles and Practices
William Easttom
(2018)
Sprog: Engelsk
Pearson Education, Limited
699,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 15 hverdage

Detaljer om varen

  • 3. Udgave
  • Vital Source searchable e-book (Reflowable pages)
  • Udgiver: Pearson International (April 2018)
  • ISBN: 9780134893099
All you need to know about defending networks, in one book ·         Clearly explains concepts, terminology, challenges, tools, and skills ·         Covers key security standards and models for business and government ·         The perfect introduction for all network/computer security professionals and students Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.   Learn How To ·         Evaluate key network risks and dangers ·         Choose the right network security approach for your organization ·         Anticipate and counter widespread network attacks, including those based on “social engineering” ·         Successfully deploy and apply firewalls and intrusion detection systems ·         Secure network communication with virtual private networks ·         Protect data with cryptographic public/private key systems, digital signatures, and certificates ·         Defend against malware, including ransomware, Trojan horses, and spyware ·         Harden operating systems and keep their security up to date ·         Define and implement security policies that reduce risk ·         Explore leading security standards and models, including ISO and NIST standards ·         Prepare for an investigation if your network has been attacked ·         Understand the growing risks of espionage and cyberterrorism  
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 3. Udgave
  • Vital Source 180 day rentals (dynamic pages)
  • Udgiver: Pearson International (April 2018)
  • ISBN: 9780134893099R180
All you need to know about defending networks, in one book ·         Clearly explains concepts, terminology, challenges, tools, and skills ·         Covers key security standards and models for business and government ·         The perfect introduction for all network/computer security professionals and students Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.   Learn How To ·         Evaluate key network risks and dangers ·         Choose the right network security approach for your organization ·         Anticipate and counter widespread network attacks, including those based on “social engineering” ·         Successfully deploy and apply firewalls and intrusion detection systems ·         Secure network communication with virtual private networks ·         Protect data with cryptographic public/private key systems, digital signatures, and certificates ·         Defend against malware, including ransomware, Trojan horses, and spyware ·         Harden operating systems and keep their security up to date ·         Define and implement security policies that reduce risk ·         Explore leading security standards and models, including ISO and NIST standards ·         Prepare for an investigation if your network has been attacked ·         Understand the growing risks of espionage and cyberterrorism  
Licens varighed:
Bookshelf online: 180 dage fra købsdato.
Bookshelf appen: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 3. Udgave
  • Vital Source 365 day rentals (dynamic pages)
  • Udgiver: Pearson International (April 2018)
  • ISBN: 9780134893099R365
All you need to know about defending networks, in one book ·         Clearly explains concepts, terminology, challenges, tools, and skills ·         Covers key security standards and models for business and government ·         The perfect introduction for all network/computer security professionals and students Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.   Learn How To ·         Evaluate key network risks and dangers ·         Choose the right network security approach for your organization ·         Anticipate and counter widespread network attacks, including those based on “social engineering” ·         Successfully deploy and apply firewalls and intrusion detection systems ·         Secure network communication with virtual private networks ·         Protect data with cryptographic public/private key systems, digital signatures, and certificates ·         Defend against malware, including ransomware, Trojan horses, and spyware ·         Harden operating systems and keep their security up to date ·         Define and implement security policies that reduce risk ·         Explore leading security standards and models, including ISO and NIST standards ·         Prepare for an investigation if your network has been attacked ·         Understand the growing risks of espionage and cyberterrorism  
Licens varighed:
Bookshelf online: 365 dage fra købsdato.
Bookshelf appen: 365 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 3. Udgave
  • Vital Source 90 day rentals (dynamic pages)
  • Udgiver: Pearson International (April 2018)
  • ISBN: 9780134893099R90
All you need to know about defending networks, in one book ·         Clearly explains concepts, terminology, challenges, tools, and skills ·         Covers key security standards and models for business and government ·         The perfect introduction for all network/computer security professionals and students Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.   Learn How To ·         Evaluate key network risks and dangers ·         Choose the right network security approach for your organization ·         Anticipate and counter widespread network attacks, including those based on “social engineering” ·         Successfully deploy and apply firewalls and intrusion detection systems ·         Secure network communication with virtual private networks ·         Protect data with cryptographic public/private key systems, digital signatures, and certificates ·         Defend against malware, including ransomware, Trojan horses, and spyware ·         Harden operating systems and keep their security up to date ·         Define and implement security policies that reduce risk ·         Explore leading security standards and models, including ISO and NIST standards ·         Prepare for an investigation if your network has been attacked ·         Understand the growing risks of espionage and cyberterrorism  
Licens varighed:
Bookshelf online: 90 dage fra købsdato.
Bookshelf appen: 90 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 3. Udgave
  • Paperback: 544 sider
  • Udgiver: Pearson Education, Limited (Juni 2018)
  • ISBN: 9780789759962

All you need to know about defending networks, in one book

· Clearly explains concepts, terminology, challenges, tools, and skills

· Covers key security standards and models for business and government

· The perfect introduction for all network/computer security professionals and students

Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career.

Learn How To

· Evaluate key network risks and dangers

· Choose the right network security approach for your organization

· Anticipate and counter widespread network attacks, including those based on "social engineering"

· Successfully deploy and apply firewalls and intrusion detection systems

· Secure network communication with virtual private networks

· Protect data with cryptographic public/private key systems, digital signatures, and certificates

· Defend against malware, including ransomware, Trojan horses, and spyware

· Harden operating systems and keep their security up to date

· Define and implement security policies that reduce risk

· Explore leading security standards and models, including ISO and NIST standards

· Prepare for an investigation if your network has been attacked

· Understand the growing risks of espionage and cyberterrorism


Chapter 1: Introduction to Network Security Introduction The Basics of a Network Basic Network Structure Data Packets IP Addresses Uniform Resource Locators MAC Addresses Protocols Basic Network Utilities ipconfig ping tracert netstat The OSI Model What Does This Mean for Security? Assessing Likely Threats to the Network Classifications of Threats Malware Compromising System Security-Intrusions Denial of Service Likely Attacks Threat Assessment Understanding Security Terminology Hacking Terminology Security Terminology Choosing a Network Security Approach Perimeter Security Approach Layered Security Approach Hybrid Security Approach Network Security and the Law Using Security Resources Summary
Chapter 2: Types of Attacks Introduction Understanding Denial of Service Attacks DoS in Action SYN Flood Smurf Attack Ping of Death UDP Flood ICMP Flood DHCP Starvation HTTP Post DoS PDoS Distributed Reflection Denial of Service DoS Tools Real-World Examples Defending Against DoS Attacks Defending Against Buffer Overflow Attacks Defending Against IP Spoofing Defending Against Session Hijacking Blocking Virus and Trojan Horse Attacks Viruses Types of Viruses Trojan Horses Summary
Chapter 3: Fundamentals of Firewalls Introduction What Is a Firewall? Types of Firewalls Packet Filtering Firewall Stateful Packet Inspection Application Gateway Circuit Level Gateway Hybrid Firewalls Blacklisting/Whitelisting Implementing Firewalls Host-Based Dual-Homed Hosts Router-Based Firewall Screened Hosts Selecting and Using a Firewall Using a Firewall Using Proxy Servers The WinGate Proxy Server NAT Summary
Chapter 4: Firewall Practical Applications Introduction Using Single Machine Firewalls Windows 10 Firewall User Account Control Linux Firewalls Iptables Symantec Norton Firewall McAfee Personal Firewall Using Small Office/Home Office Firewalls SonicWALL D-Link DFL-2560 Office Firewall Using Medium-Sized Network Firewalls Check Point Firewall Cisco Next-Generation Firewalls Using Enterprise Firewalls Summary
Chapter 5: Intrusion-Detection Systems Introduction Understanding IDS Concepts Preemptive Blocking Anomaly Detection IDS Components and Processes Understanding and Implementing IDSs Snort Cisco Intrusion-Detection and Prevention Understanding and Implementing Honeypots Specter Symantec Decoy Server Intrusion Deflection Intrusion Deterrence Summary
Chapter 6: Encryption Fundamentals Introduction The History of Encryption The Caesar Cipher ROT 13 Atbash Cipher Multi-Alphabet Substitution Rail Fence Vigenère Enigma Binary Operations Learning About Modern Encryption Methods Symmetric Encryption Key Stretching PRNG Public Key Encryption Digital Signatures Identifying Good Encryption Understanding Digital Signatures and Certificates Digital Certificates PGP Certificates MD5 SHA RIPEMD HAVAL Understanding and Using Decryption Cracking Passwords John the Ripper Using Rainbow Tables Using Other Password Crackers General Cryptanalysis Steganography Steganalysis Quantum Computing and Quantum Cryptography Summary
Chapter 7: Virtual Private Networks Introduction Basic VPN Technology Using VPN Protocols for VPN Encryption PPTP PPTP Authentication L2TP L2TP Authentication L2TP Compared to PPTP IPSec SSL/TLS Implementing VPN Solutions Cisco Solutions Service Solutions Openswan Other Solutions Summary
Chapter 8: Operating System Hardening Introduction Configuring Windows Properly Accounts, Users, Groups, and Passwords Setting Security Policies Registry Settings Services
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Fysisk eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.