Skip to main content

University of Greenwich - Shop


Network Security Bible (PDF eBook) 2nd edition

eBook by Cole, Eric;

Network Security Bible (PDF eBook)

£47.50

ISBN:
9780470569993
Publication Date:
18 Sep 2009
Edition:
2nd edition
Publisher:
Wiley
Pages:
944 pages
Format:
eBook
For delivery:
Download available
Network Security Bible (PDF eBook)

Description

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security. • Covers all core areas of network security and how they interrelate • Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide • Examines new trends and best practices in use by organizations to secure their enterprises • Features additional chapters on areas related to data protection/correlation and forensics • Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.

Contents

Introduction. Part I: Network Security Landscape. Chapter 1: State of Network Security. Chapter 2: New Approaches to Cyber Security. Chapter3: InterfacingwiththeOrganization. Part II: Security Principles and Practices. Chapter 4: Information System Security Principles. Chapter 5: Information System Security Management. Chapter 6: Access Control. Chapter 7: Attacks and Threats. Part III: Operating Systems and Applications. Chapter 8: Windows Security. Chapter 9: UNIX and Linux Security. Chapter 10: Web Browser and Client Security. Chapter 11: Web Security. Chapter 12: Electronic mail (E-mail) Security. Chapter13:DomainName System. Chapter 14: Server Security. Part IV: Network Security Fundamentals. Chapter15:NetworkProtocols. Chapter 16: Wireless Security. Chapter17:NetworkArchitecture Fundamentals. Chapter18: Firewalls. Chapter 19: Intrusion Detection/Prevention. Part V: Communication. Chapter 20: Secret Communication. Chapter21:CovertCommunication. Chapter 22: Applications of Secure/Covert Communication. Part VI: The Security Threat and Response. Chapter23: IntrusionDetection andResponse. Chapter 25: Security Assessments, Testing, and Evaluation. Part VII: Integrated Cyber Security. Chapter 26: Validating Your Security. Chapter27:DataProtection. Chapter 28: Putting Everything Together. Chapter29:The Future. Index.

Accessing your eBook through Kortext

Once purchased, you can view your eBook through the Kortext app, available to download for Windows, Android and iOS devices. Once you have downloaded the app, your eBook will be available on your Kortext digital bookshelf and can even be downloaded to view offline anytime, anywhere, helping you learn without limits.

In addition, you'll have access to Kortext's smart study tools including highlighting, notetaking, copy and paste, and easy reference export.

To download the Kortext app, head to your device's app store or visit https://app.kortext.com to sign up and read through your browser.

This is a Kortext title - click here to find out more This is a Kortext title - click here to find out more

NB: eBook is only available for a single-user licence (i.e. not for multiple / networked users).

Back

University of Greenwich