Network Security Bible

by
Edition: 2nd
Format: Paperback
Pub. Date: 2009-09-08
Publisher(s): Wiley
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $62.99

Buy New

Arriving Soon. Will ship when available.
$59.99

Buy Used

Arriving Soon. Will ship when available.
$44.99

Rent Book

Select for Price
There was a problem. Please try again later.

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The Network Security Bible 2e is organized into seven sections covering all of the most recent security topics and developments in technology. Of note to the reader are the cutting edge topics of Integrated Cybersecurity and the Security Landscape sections with intriguing chapters on Validating Your Security, Data Protection, Forensics and Attacks and Threats.

Author Biography

Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.

Table of Contents

Introduction
Network Security Landscape
State of Network Security
New Approaches to Cyber Security
InterfacingwiththeOrganization
Security Principles and Practices
Information System Security Principles
Information System Security Management
Access Control
Attacks and Threats
Operating Systems and Applications
Windows Security
UNIX and Linux Security
Web Browser and Client Security
Web Security
Electronic mail (E-mail) Security
DomainName System
Server Security
Network Security Fundamentals
NetworkProtocols
Wireless Security
NetworkArchitecture Fundamentals
Firewalls
Intrusion Detection/Prevention
Communication
Secret Communication
CovertCommunication
Applications of Secure/Covert Communication
The Security Threat and Response
IntrusionDetection andResponse
Security Assessments, Testing, and Evaluation
Integrated Cyber Security
Validating Your Security
DataProtection
Putting Everything Together
The Future
Index
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.