000 | 02524nam a22002777a 4500 | ||
---|---|---|---|
003 | NULRC | ||
005 | 20241121135740.0 | ||
008 | 241121b ph ||||| |||| 00| 0 eng d | ||
020 | _a9781133279075 | ||
040 | _cNULRC | ||
050 | _aQA 76.9.A25 .G85 2013 | ||
100 |
_aWhitman, Michael E. _eauthor |
||
245 |
_aGuide to network security / _cMichael E. Whitman, Herbert J. Mattord, David Mackey and Andrew Green |
||
250 | _aInternational Edition. | ||
260 |
_aBoston, MA : _bCourse Technology/Cengage Learning, _cc2013. |
||
300 |
_axxii, 554 pages ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _a Introduction to information security -- Introduction to networking -- Cryptography -- Firewall technologies and administration -- Network authentication and remote access using VPN -- Network monitoring and intrusion detection and prevention systems -- Wireless network security -- Security of web applications -- Network vulnerability assessment -- Auditing, monitoring, and logging -- Contingency planning and networking incident response -- Digital forensics. | ||
520 | _aThis book is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future. | ||
650 | _aCOMPUTER SECURITY | ||
650 | _aDIGITAL FORENSIC SCIENCE | ||
700 |
_aMattord, Herbert J. _eco-author |
||
700 |
_aMackey, David (David H.) _eco-author |
||
700 |
_aGreen, Andrew _eco-author |
||
942 |
_2lcc _cBK _n0 |
||
999 |
_c1715 _d1715 |