My Account Details

ISBN10: 0072230932 | ISBN13: 9780072230932

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program.This book introduces a strong foundation that includes security policy, planning, and development of good processes. A step-by-step design teaches students security implementation using recent advances in security tools, such as firewalls, VPN's, encryption, techniques, and intrusion detection devises. Platform-specific defenses are revealed for the desktop, Windows networks, UNIX, Internet, and wireless systems. Laws and government regulation are also covered, including the Patriot Act, homeland security initiatives, and special information on relevant state laws.
PART I: Information Security Basics 1: What Is Information Security? 2: Types of Attacks 3: Hacker Techniques 4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
2: Types of Attacks 3: Hacker Techniques 4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
19: E-Commerce Security Needs 20: Wireless Security
Need support? We're here to help - Get real-world support and resources every step of the way.