Network Security A Beginner's Guide, Third Edition, 3rd Edition
* The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include thelatest and most effective security strategies.
You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption technologies arediscussed in detail. The book explains how to create and deploy an effective security policy, manage and assess risk, and perform audits. Information security best practices and standards, including ISO/IEC 27002, arecovered in this practical resource.
Network Security: A Beginner's Guide, ThirdEdition features:
- Lingo--Common security terms defined so that you're in the know on the job
- IMHO--Frank and relevant opinions based on theauthor's years of industry experience
- Budget Note--Tips for getting security technologies and processes into your organization's budget
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to applynew skills and techniques at work
Part I: Informaiton Security Basics
1 What is Information Security?
2 Types of Attacks
3 Hacker Techniques
4 Information Security Services
Part II: Ground Work
6 Managing Risk
7 Information Security Process
8 Information Security Best Practices & Drivers
Part III: Network Security Technology
9 Perimeter Technology
10 Monitoring Technology
11 Encryption Technology