
Network Security Bible
by Cole, Eric-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Buy New
Buy Used
Rent Book
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.
Table of Contents
Introduction | |
Network Security Landscape | |
State of Network Security | |
New Approaches to Cyber Security | |
InterfacingwiththeOrganization | |
Security Principles and Practices | |
Information System Security Principles | |
Information System Security Management | |
Access Control | |
Attacks and Threats | |
Operating Systems and Applications | |
Windows Security | |
UNIX and Linux Security | |
Web Browser and Client Security | |
Web Security | |
Electronic mail (E-mail) Security | |
DomainName System | |
Server Security | |
Network Security Fundamentals | |
NetworkProtocols | |
Wireless Security | |
NetworkArchitecture Fundamentals | |
Firewalls | |
Intrusion Detection/Prevention | |
Communication | |
Secret Communication | |
CovertCommunication | |
Applications of Secure/Covert Communication | |
The Security Threat and Response | |
IntrusionDetection andResponse | |
Security Assessments, Testing, and Evaluation | |
Integrated Cyber Security | |
Validating Your Security | |
DataProtection | |
Putting Everything Together | |
The Future | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.