Cole | Network Security Bible | E-Book | sack.de
E-Book

E-Book, Englisch, 944 Seiten, E-Book

Reihe: Bible

Cole Network Security Bible


2. Auflage 2011
ISBN: 978-0-470-57000-5
Verlag: John Wiley & Sons
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 944 Seiten, E-Book

Reihe: Bible

ISBN: 978-0-470-57000-5
Verlag: John Wiley & Sons
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The comprehensive A-to-Z guide on network security, fullyrevised and updated
Network security is constantly evolving, and this comprehensiveguide has been thoroughly updated to cover the newest developments.If you are responsible for network security, this is the referenceyou need at your side.
Covering new techniques, technology, and methods for approachingsecurity, it also examines new trends and best practices being usedby many organizations. The revised Network Security Biblecomplements the Cisco Academy course instruction in networkingsecurity.
* Covers all core areas of network security and how theyinterrelate
* Fully revised to address new techniques, technology, andmethods for securing an enterprise worldwide
* Examines new trends and best practices in use by organizationsto secure their enterprises
* Features additional chapters on areas related to dataprotection/correlation and forensics
* Includes cutting-edge topics such as integrated cybersecurityand sections on Security Landscape, with chapters on validatingsecurity, data protection, forensics, and attacks and threats
If you need to get up to date or stay current on networksecurity, Network Security Bible, 2nd Edition coverseverything you need to know.

Cole Network Security Bible jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Introduction.
Part I: Network Security Landscape.
Chapter 1: State of Network Security.
Chapter 2: New Approaches to Cyber Security.
Chapter3: InterfacingwiththeOrganization.
Part II: Security Principles and Practices.
Chapter 4: Information System Security Principles.
Chapter 5: Information System Security Management.
Chapter 6: Access Control.
Chapter 7: Attacks and Threats.
Part III: Operating Systems and Applications.
Chapter 8: Windows Security.
Chapter 9: UNIX and Linux Security.
Chapter 10: Web Browser and Client Security.
Chapter 11: Web Security.
Chapter 12: Electronic mail (E-mail) Security.
Chapter13:DomainName System.
Chapter 14: Server Security.
Part IV: Network Security Fundamentals.
Chapter15:NetworkProtocols.
Chapter 16: Wireless Security.
Chapter17:NetworkArchitecture Fundamentals.
Chapter18: Firewalls.
Chapter 19: Intrusion Detection/Prevention.
Part V: Communication.
Chapter 20: Secret Communication.
Chapter21:CovertCommunication.
Chapter 22: Applications of Secure/Covert Communication.
Part VI: The Security Threat and Response.
Chapter23: IntrusionDetection andResponse.
Chapter 25: Security Assessments, Testing, and Evaluation.
Part VII: Integrated Cyber Security.
Chapter 26: Validating Your Security.
Chapter27:DataProtection.
Chapter 28: Putting Everything Together.
Chapter29:The Future.
Index.


Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.