Network Security: The Complete Reference / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (18) from $1.99   
  • New (2) from $58.77   
  • Used (16) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
“Network security” covers so many issues and technologies that nobody can master all of them. Still, systems need to be secured, and administrators need to secure them. If that’s your job, you can refer to Network Security: The Complete Reference for a solid briefing on just about any security challenge you might face.

This book offers intelligent coverage of the entire security “lifecycle,” from risk analysis to attack response. Need to review the fundamentals of access, authentication, and authorization? Or the principles of security architecture? Need a primer on what you can do to harden your existing network right now? Need a better understanding of the limitations of firewalls? It’s all in here.

Need to secure a wireless network? Here’s what to do -- and what not to do. Need a better understanding of role-based security? This book walks you through the issues you’ll encounter and your options for handling them. Whatever leading network operating system you’re using -- UNIX, Windows, Linux, NetWare -- the authors outline its vulnerabilities and offer best practices for locking it down.

If you’re a developer (or work with developers), you’ll welcome the book’s detailed coverage of application security principles. (Not to mention the chapters on security in both J2EE and .NET environments.) There’s also a walkthrough of database security at the server, network, OS, and individual database levels.

Oh, and if someone in your organization doesn’t think this stuff matters, there’s even a lawyer’s guide to the liability issues that go with insecure networks. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780072226973
  • Publisher: McGraw-Hill Professional Publishing
  • Publication date: 11/10/2003
  • Series: Osborne Complete Reference Series
  • Edition number: 1
  • Pages: 896
  • Product dimensions: 7.30 (w) x 9.10 (h) x 2.07 (d)

Meet the Author

Roberta Bragg (CISSP, MCSE: Security; Security+, ETI Client Server, Certified Technical Trainer, IBM Certified Trainer, DB2-UDB, Citrix Certified Administrator) has been a Security Advisor columnist for Microsoft Certified Professional Magazine for five years, is a Security Expert for, and writes for the “SecurityWatch” newsletter, which has more than 55,000 subscribers. Roberta designed, planned, produced, and participated in the first Windows Security Summit, held in Seattle, Washington, in 2002. In September and October of 2002, Roberta was an instructor for four sessions of SANS Gold Standard Windows 2000 Training. Roberta has participated in numerous security audits and is a security evangelist traveling all over the world consulting, assessing, and training on network and Windows security. Roberta has served as adjunct faculty at Seattle Pacific University and at Johnson County Community College teaching courses on Windows 2000 Security Design and Network Security Design.

Mark Rhodes-Ousley (CISSP) has been a practicing security professional for more than ten years. Mark has advised, designed, and installed security technologies and policies for dozens of companies, including Fortune 500 companies, large, medium-sized, and many small companies. All this experience with companies in different stages of growth leads to a unique perspective on how to manage security for a growing company—where to begin, what to do when moving forward, and how to plan for future growth. Mark holds certifications from the International Information Systems Security Certification Consortium, known as (ISC)2, Cisco Systems, Security Dynamics, Raptor Systems, Hewlett Packard, and Digital Equipment


along with a Bachelor degree in Applied Mathematics and Electrical Engineering from the University of California, San Diego (UCSD).

Keith Strassberg (CPA, CISSP) is an independent security consultant with more than seven years of experience in information security. Most recently, he worked as a senior security engineer for a mid-sized technology consulting company. Keith’s professional experiences cover all facets of information security, including, but not limited to, designing and deploying secure infrastructures, implementing firewalls and intrusion detection systems, performing computer forensic investigations, developing policies and procedures, and performing vulnerability testing.

Read More Show Less

Table of Contents

Pt. I Network Security Foundations
1 Network Security Overview 3
2 Risk Analysis and Defense Models 31
3 Security Policy Development 47
4 Security Organization 81
Pt. II Access Control
5 Physical Security 117
6 Authentication and Authorization Controls 127
7 Data Security Architecture 153
8 Security Management Architecture 175
Pt. III Network Architecture
9 Network Design Considerations 193
10 Network Device Security 213
11 Firewalls 229
12 Virtual Private Network Security 247
13 Wireless Network Security 263
14 Intrusion-Detection Systems 295
15 Integrity and Availability Architecture 335
16 Network Role-Based Security 359
Pt. IV Operating System Security
17 Operating System Security Models 431
18 Common Unix Vulnerabilities 451
19 Linux Security 471
20 Windows Security 485
21 Novell Security 525
Pt. V Application Security
22 Principals of Application Security 557
23 Writing Secure Software 581
24 J2EE Security 599
25 Windows .NET Security 623
26 Database Security 657
Pt. VI Response
27 Disaster Recovery and Business Continuity 683
28 Attacks and Countermeasures 703
29 Incident Response and Forensic Analysis 739
30 Legal Issues: The Laws Affecting Information Security Professionals 761
Glossary 789
Index 815
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)