Network Defense and Countermeasures: Principles and Practices

$11.22

Pickup available at Bookstore (Hours: Open Everyday, 8 am to 4 pm)

Usually ready in 24 hours


Network Defense and Countermeasures: Principles and Practices Everything you need to know about modern network attacks and defense, in one book Clearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attacks and countermeasures The perfect beginner’s guide for anyone interested in a network security career Security is the IT industry’s hottest topic–and that’s where the hottest opportunities are, too. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments. Today, security begins with defending the organizational network. Network Defense and Countermeasures, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense. From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism. If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks. Chuck Easttom has worked in all aspects of IT, including network administration, software engineering, and IT management. For several years, he has taught IT topics in college and corporate environments, worked as an independent IT consultant, and served as an expert witness in court cases involving computers. He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. He served as subject matter expert for CompTIA in its development or revision of four certification tests, including Security+. He recently assisted the EC Council in developing its new advanced cryptography course. Easttom has authored 13 books on topics including computer security and crime. Learn how to n Understand essential network security concepts, challenges, and careers n Learn how modern attacks work n Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks n Select the right security technologies for any network environment n Use encryption to protect information n Harden Windows and Linux systems and keep them patched n Securely configure web browsers to resist attacks n Defend against malware n Define practical, enforceable security policies n Use the “6 Ps” to assess technical and human aspects of system security n Detect and fix system vulnerability n Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula n Ensure physical security and prepare for disaster recovery n Know your enemy: learn basic hacking, and see how to counter it n Understand standard forensic techniques and prepare for investigations of digital crime
ASIN: 0789750945
VSKU: DBV.0789750945.A
Condition: Acceptable
Author/Artist:Easttom, Chuck
Binding: Paperback
Note on Condition

Most of the items in our store are used. The item's condition grade is indicated near the bottom of the product description. If you have any questions regarding specific details of an item, please contact us. We use the following rating scale:

Books:

  • Used - Very Good: Item may have minor cosmetic defects (marks, wears, cuts, bends, crushes) on the cover, spine, pages or dust cover. Shrink wrap, dust covers, or boxed set case may be missing. Item may contain remainder marks on outside edges, which should be noted in listing comments. Item may be missing bundled media. 
  • Used - Good: All pages and cover are intact (including the dust cover, if applicable). Spine may show signs of wear. Pages may include limited notes and highlighting. Gently used ex-library books with library stickers and markings may be classified as good. Shrink wrap, dust covers, or boxed set case may be missing. Item may be missing bundled media. 
  • Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may but the dust cover may be missing. Pages may include limited notes and highlighting, but the text cannot be obscured or unreadable.

CDs/DVDs/Discs:

  • Used - Good: Case may be damaged or come repackaged. Disc may have up to 1.5cm marking but is in great working condition. 
  • Used - Acceptable: A product with extensive external signs of wear, but is in great working condition. The case may be damaged. The cover art, liner, notes, or other inclusion may be marked, or one or all of these items may be missing.
Shipping & Returns

Shipping: Most orders are shipped within 2 business days.

Returns: We want you to be completely satisfied with your purchase. If you're not, you can return your order within 30 days of purchase for a refund.

Fast Shipping

Orders are typically processed and shipped within 2 days

Competitive Pricing

We've streamlined our processes to provide competitive prices on all our titles

Exceptional Customer Service

Our dedicated team is committed to providing outstanding customer support