BN.com Gift Guide

Wiley Pathways Network Security Fundamentals / Edition 1

Paperback (Print)
Rent
Rent from BN.com
$22.09
(Save 72%)
Est. Return Date: 02/19/2015
Used and New from Other Sellers
Used and New from Other Sellers
from $7.00
Usually ships in 1-2 business days
(Save 91%)
Other sellers (Paperback)
  • All (10) from $7.00   
  • New (6) from $18.95   
  • Used (4) from $7.00   

Overview

You can get there

Whether you're already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies and skills you need to succeed.

With this book, you will be able to:
* Understand basic terminology and concepts related to security
* Utilize cryptography, authentication, authorization and access control to increase your Windows, Unix or Linux network's security
* Recognize and protect your network against viruses, worms, spyware, and other types of malware
* Set up recovery and fault tolerance procedures to plan for the worst and to help recover if disaster strikes
* Detect intrusions and use forensic analysis to investigate the nature of the attacks

Network Security Fundamentals is ideal for both traditional and online courses. The accompanying Network Security Fundamentals Project Manual ISBN: 978-0-470-12798-8 is also available to help reinforce your skills.

Wiley Pathways helps you achieve your goals

The texts and project manuals in this series offer a coordinated curriculum for learning information technology. Learn more at www.wiley.com/go/pathways.

Read More Show Less

Product Details

  • ISBN-13: 9780470101926
  • Publisher: Wiley
  • Publication date: 8/3/2007
  • Series: Wiley Pathways Series
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 552
  • Product dimensions: 7.28 (w) x 9.29 (h) x 0.74 (d)

Table of Contents

1 Network Security Principles 1

Introduction 2

1.1 Importance of Computer and Network Security 2

1.2 Underlying Computer and Network Security Concepts 6

1.3 Threats and Countermeasures 11

1.4 Policies and Standards 20

2 Network and Server Security 30

Introduction 31

2.1 Network Protocols Review 31

2.2 Best Practices for Network Security 45

2.3 Securing Servers 49

2.4 Border Security 57

3 Cryptography 74

Introduction 75

3.1 Cryptography Overview 75

3.2 Symmetric Encryption 83

3.3 Asymmetric Encryption 90

3.4 Hashes 93

3.5 Achieving CIA 97

3.6 Public Key Infrastructure (PKI) 99

4 Authentication 118

Introduction 119

4.1 Authentication Overview 119

4.2 Authentication Credentials 125

4.3 Authentication Protocols 131

4.4 Best Practices for Secure Authentication 136

5 Authentication and Access Control 149

Introduction 150

5.1 Access Control Models 150

5.2 Implementing Access Control on Windows Computers 154

5.3 Implementing Access Control on Unix Computers 174

6 Securing Network Transmission 188

Introduction 189

6.1 Analyzing Security Requirements for Network Traffic 189

6.2 Defining Network Perimeters 195

6.3 Data Transmission Protection Protocols 201

7 Remote Access and Wireless Security 221

7.1 Dial-Up Networking 222

7.2 Virtual Private Networks 230

7.3 RADIUS and TACACS 235

7.4 Wireless Networks 239

8 Server Roles and Security 262

Introduction 263

8.1 Server Roles and Baselines 263

8.2 Securing Network Infrastructure Servers 274

8.3 Securing Domain Controllers 289

8.4 Securing File and Print Servers 292

8.5 Securing Application Servers 298

9 Protecting Against Malware 310

9.1 Viruses and Other Malware 311

9.2 Protecting the Workstation 315

9.3 Web Browser Security 323

9.4 Email Security 336

10 Ongoing Security Management 356

Introduction 357

10.1 Managing Updates 357

10.2 Auditing and Logging 366

10.3 Secure Remote Administration 371

11 Disaster Recovery and Fault Tolerance 395

Introduction 396

11.1 Planning for the Worst 396

11.2 Creating a Backup Strategy 407

11.3 Designing for Fault Tolerance 415

12 Intrusion Detection and Forensics 433

Introduction 434

12.1 Intrusion Detection 434

12.2 Honeypots 439

12.3 Forensics 444

Glossary 462

Index 507

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted February 22, 2010

    it's a college book

    meh - my professor hate it. They say it's okay but they really feel it leaves a lot to be desired and is confusing in the areas it needs to be focused on and too much irrelevant stuff.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)