Introduction to Security and Network Forensics

Regular price €72.99
Quantity:
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=William J. Buchanan
advanced intrusion detection systems
Alice's Private Key
Alice's Public Key
Alice’s Private Key
Alice’s Public Key
authentication protocols
Author_William J. Buchanan
Bob's Private Key
Bob's Public Key
Bob’s Private Key
Bob’s Public Key
Category=JKVF1
Category=PS
Category=UBL
Category=UR
Category=UT
Category=UY
channel
Common Language
computer incident response
covert
Covert Channels
Destination IP Address
detection
digital
digital certificate validation
Dst Port
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
eq_science
eq_society-politics
Ethernet II
intrusion
IP
Ip Access Group
key
Mac Address
MSN Messenger
Nat Device
Net Framework
Payload Length
Ping Sweeps
private
Private Key
SAML
server
software vulnerability analysis
Static Void Main
STS
system
Tcp
Tcp Port
threat modelling
Transmission Control Protocol
Vendor Id
web
wireless network security

Product details

  • ISBN 9780849335686
  • Weight: 1032g
  • Dimensions: 178 x 254mm
  • Publication Date: 06 Jun 2011
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Hardback
Secure checkout Fast Shipping Easy returns

Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics.

Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including:

  • More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements
  • 60,000 test questions, including for Certified Ethical Hacking and CISSP®
  • 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labs

Rounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats.
Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com.

Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, UK. He currently leads the Centre for Distributed Computing and Security, along with leading the Scottish Centre of Excellence in Security and Cybercrime. He works in the areas of security, e-Crime, intrusion detection systems, digital forensics, e-Health, mobile computing, agent-based systems, and simulation. Professor Buchanan has one of the most extensive academic sites in the World, and is involved in many areas of novel teaching in computing, including a widely-used network simulation package.

He has published over 25 academic books, and over 120 academic research papers, along with awards for excellence in knowledge transfer. Presently he is working with a range of industrial/domain partners, including within law enforcement, health care, and finance. Along with this he has been involved in university start-ups and in generating novel methods within security and digital forensics.

More from this author