Network Defense and Countermeasures: Principles and Practices

Taschenbuch, Sprache: Englisch
77,99 €
inkl. MwSt. versandkostenfrei!

Reduzierte Artikel in dieser Kategorie


Produktdetails  
Verlag Pearson Education
Auflage 2024
Seiten 544
Format 17,8 x 23,1 x 3,4 cm
Gewicht 848 g
Artikeltyp Englisches Buch
EAN 9780789759962
Bestell-Nr 78975996EA

Produktbeschreibung  

All you need to know about defending networks, in one book

· Clearly explains concepts, terminology, challenges, tools, and skills

· Covers key security standards and models for business and government

· The perfect introduction for all network/computer security professionals and students

Welcome to todays most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions youll need to be effective.

Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.

Youll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. Youll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.

Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what youve learnedin the classroom and in your career.

Learn How To

· Evaluate key network risks and dangers

· Choose the right network security approach for your organization

· Anticipate and counter widespread network attacks, including those based on social engineering

· Successfully deploy and apply firewalls and intrusion detection systems

· Secure network communication with virtual private networks

· Protect data with cryptographic public/private key systems, digital signatures, and certificates

· Defend against malware, including ransomware, Trojan horses, and spyware

· Harden operating systems and keep their security up to date

· Define and implement security policies that reduce risk

· Explore leading security standards and models, including ISO and NIST standards

· Prepare for an investigation if your network has been attacked

· Understand the growing risks of espionage and cyberterrorism

Inhaltsverzeichnis:

Chapter 1: Introduction to Network Security

Introduction

The Basics of a Network

    Basic Network Structure

    Data Packets

    IP Addresses

    Uniform Resource Locators

    MAC Addresses

    Protocols

Basic Network Utilities

    ipconfig

    ping

    tracert

    netstat

The OSI Model

What Does This Mean for Security?

Assessing Likely Threats to the Network

Classifications of Threats

    Malware

    Compromising System Security Intrusions

    Denial of Service

Likely Attacks

Threat Assessment

Understanding Security Terminology

    Hacking Terminology

    Security Terminology

Choosing a Network Security Approach

    Perimeter Security Approach

    Layered Security Approach

    Hybrid Security Approach

Network Security and the Law

Using Security Resources

Summary

Chapter 2: Types of Attacks

Introduction

Understanding Denial of Service Attacks

    DoS in Action

    SYN Flood

    Smurf Attack

    Ping of Death

    UDP Flood

    ICMP Flood

    DHCP Starvation

    HTTP Post DoS

    PDoS

    Distributed Reflection Denial of Service

    DoS Tools

    Real-World Examples

    Defending Against DoS Attacks

Defending Against Buffer Overflow Attacks

Defending Against IP Spoofing

Defending Against Session Hijacking

Blocking Virus and Trojan Horse Attacks

    Viruses

    Types of Viruses

    Trojan Horses

Summary

Chapter 3: Fundamentals of Firewalls

Introduction

What Is a Firewall?

    Types of Firewalls

    Packet Filtering Firewall

    Stateful Packet Inspection

    Application Gateway

    Circuit Level Gateway

    Hybrid Firewalls

Autorenporträt  
Mehr Angebote zum Thema