Network Defense and Countermeasures: Principles and Practices | Agenda Bookshop Skip to content
A01=II
A01=William Easttom
Age Group_Uncategorized
Age Group_Uncategorized
Author_II
Author_William Easttom
automatic-update
Category1=Non-Fiction
Category=UTN
Category=UTS
COP=United States
Delivery_Pre-order
Language_English
PA=Not yet available
Price_€50 to €100
PS=Forthcoming
softlaunch

Network Defense and Countermeasures: Principles and Practices

English

By (author): II William Easttom

All you need to know about defending networks, in one book

  • Clearly explains concepts, terminology, challenges, tools, and skills
  • Covers key security standards and models for business and government
  • The perfect introduction for all network/computer security professionals and students

Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learnedin the classroom and in your career.

LEARN HOW TO

  • Evaluate key network risks and dangers
  • Choose the right network security approach for your organization
  • Anticipate and counter widespread network attacks, including those based on social engineering
  • Successfully deploy and apply firewalls and intrusion detection systems
  • Secure network communication with virtual private networks
  • Protect data with cryptographic public/private key systems, digital signatures, and certificates
  • Defend against malware, including ransomware, Trojan horses, and spyware
  • Harden operating systems and keep their security up to date
  • Define and implement security policies that reduce risk
  • Explore leading security standards and models, including ISO and NIST standards
  • Prepare for an investigation if your network has been attacked
  • Understand the growing risks of espionage and cyberterrorism
See more
Current price €73.09
Original price €84.99
Save 14%
A01=IIA01=William EasttomAge Group_UncategorizedAuthor_IIAuthor_William Easttomautomatic-updateCategory1=Non-FictionCategory=UTNCategory=UTSCOP=United StatesDelivery_Pre-orderLanguage_EnglishPA=Not yet availablePrice_€50 to €100PS=Forthcomingsoftlaunch

Will deliver when available. Publication date 30 Apr 2024

Product Details
  • Publication Date: 07 May 2024
  • Publisher: Pearson Education (US)
  • Publication City/Country: United States
  • Language: English
  • ISBN13: 9780138200589

About IIWilliam Easttom

Dr. Chuck Easttom is the author of 41 books including several on computer security forensics and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cybersecurity a Ph.D. in nanotechnology a Ph.D. in computer science and three master's degrees (one in applied computer science one in education and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for Vanderbilt University.

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept