Guide to network security / Michael E. Whitman, Herbert J. Mattord, David Mackey and Andrew Green
Material type:
- 9781133279075
- QA 76.9.A25 .G85 2013

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Engineering | GC QA 76.9.A25 .G85 2013 (Browse shelf(Opens below)) | c.1 | Available | NULIB000020372 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Computer Engineering Close shelf browser (Hides shelf browser)
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.8.R19 .N67 2014 Raspberry pi projects for the evil genius / | GC QA 76.9 .K36 1994 PC security and virus protection : the ongoing war against information sabotage / | GC QA 76.9.A25 .A46 1994 Fundamentals of computer security technology / | GC QA 76.9.A25 .G85 2013 Guide to network security / | GC QA 76.9.A73 .H46 2012 c.1 Computer architecture : a quantitative approach / | GC QA 76.9.C643 .N85 2019 The Essentials of computer organization and architecture / | GC QA 76.9.C643 .P38 2012 Computer organization and design : the hardware/software interface / |
Includes bibliographical references and index.
Introduction to information security -- Introduction to networking -- Cryptography -- Firewall technologies and administration -- Network authentication and remote access using VPN -- Network monitoring and intrusion detection and prevention systems -- Wireless network security -- Security of web applications -- Network vulnerability assessment -- Auditing, monitoring, and logging -- Contingency planning and networking incident response -- Digital forensics.
This book is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.
There are no comments on this title.