Network Security Bible Second Edition
The comprehensive A-to-Z guide on network security, fully revised and updated
Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.
Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.
- Covers all core areas of network security and how they interrelate
- Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide
- Examines new trends and best practices in use by organizations to secure their enterprises
- Features additional chapters on areas related to data protection/correlation and forensics
- Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats
If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.
Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.
Table of Contents
Part I: Network Security Landscape.
Chapter 1: State of Network Security.
Chapter 2: New Approaches to Cyber Security.
Part II: Security Principles and Practices.
Chapter 4: Information System Security Principles.
Chapter 5: Information System Security Management.
Chapter 6: Access Control.
Chapter 7: Attacks and Threats.
Part III: Operating Systems and Applications.
Chapter 8: Windows Security.
Chapter 9: UNIX and Linux Security.
Chapter 10: Web Browser and Client Security.
Chapter 11: Web Security.
Chapter 12: Electronic mail (E-mail) Security.
Chapter 14: Server Security.
Part IV: Network Security Fundamentals.
Chapter 16: Wireless Security.
Chapter 19: Intrusion Detection/Prevention.
Part V: Communication.
Chapter 20: Secret Communication.
Chapter 22: Applications of Secure/Covert Communication.
Part VI: The Security Threat and Response.
Chapter23: IntrusionDetection andResponse.
Chapter 25: Security Assessments, Testing, and Evaluation.
Part VII: Integrated Cyber Security.
Chapter 26: Validating Your Security.
Chapter 28: Putting Everything Together.
Sign up now »
- FTQuality ManagerSA
- FTR&D EngineerSA
- FTLead Software EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTTechnical Business AnalystNSW
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
The most comprehensive assessment of the current state of enterprise application quality and testing practices available from around the world. With our 1550 respondents, Capgemini, HP & Sogeti bring you ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- DHS warns employees that years-old database hole puts their privacy at risk
- Twitter's two-step authentication a good start, experts say
- U.S. urged to let companies 'hack-back' at IP cyber thieves
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- CITRIX SYNERGY ’13: Partners and customers main focus in mobile strategy, says Willis
- CITRIX SYNERGY ’13: Mobile is key to a digital worklife, says CEO (+12 photos)
- ASI brings LapCabby to Australia
- Two in three Australian tweens are on a social network: McAfee
- Huawei Australia 2012 revenue up 61 per cent to $368m
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes