Fundamentals of Network Security

Fundamentals of Network Security

4.5 (24 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?


Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program.This book introduces a strong foundation that includes security policy, planning, and development of good processes. A step-by-step design teaches students security implementation using recent advances in security tools, such as firewalls, VPN's, encryption, techniques, and intrusion detection devises. Platform-specific defenses are revealed for the desktop, Windows networks, UNIX, Internet, and wireless systems. Laws and government regulation are also covered, including the Patriot Act, homeland security initiatives, and special information on relevant state laws.
show more

Product details

  • Paperback | 672 pages
  • 191 x 236 x 32mm | 1,141g
  • MCGRAW-HILL Professional
  • New York, NY, United States
  • English
  • 94 Illustrations, unspecified
  • 0072230932
  • 9780072230932
  • 1,539,978

Back cover copy

Essential IT Skills for On-the-Job Success

Fundamentals of Network Security is a comprehensive introduction to computer and network security. It provides a fundamental understanding of security best practices, laws, and standards that will enable you to build a complete security program. It includes the most recent advances in security tools and platform-specific defenses.

Inside this book, you will learn to:

Assess the threats, vulnerabilities, and risks to a network Defend against access, modification, denial-of-service, and repudiation attacks Identify a variety of hacking methods, including sniffing, spoofing, viruses, Trojan horses, and worms Apply new federal and state laws, including the Patriot Act, HIPAA, and Graham Leach-Bliley Configure wireless security technologies Create policy, manage risk, and implement an information security program Develop a backup and recovery plan Apply security technologies such as firewalls, VPNs, encryption methods, and intrusion detection systems Implement platform-specific security measures for computer desktops, UNIX, and Windows NT/2000/2003 Implement security measures for e-commerce

Key features:

Critical Skills Identified in Each Chapter Easy-to-Understand Diagrams and Figures Blueprints That Illustrate Key Security Concepts for Quick Reference Detailed Step-by-Step Projects Progress Check Exercises Ask the Expert Sidebars Helpful Notes, Tips, and Cautions Chapter Summaries and Key Term Lists End-of-Chapter Quizzes and Lab Projects
show more

Table of contents

PART I: Information Security Basics 1: What Is Information Security? 2: Types of Attacks 3: Hacker Techniques 4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
show more

About Eric Maiwald

Eric Maiwald is a Research Vice President with Gartner, Inc. where he focuses on enterprise security infrastructure and mobility technologies. Mr. Maiwald has over twenty years of experience in information security where has worked as a security officer and consultant for large financial institutions, healthcare providers, services firms, and manufacturers. He has extensive experience in the security field performing assessments, policy development, architecture design, and product implementations. Mr. Maiwald holds a Bachelors of Science in Electrical Engineering degree from Rensselaer Polytechnic Institute and a Masters of Engineering in Electrical Engineering from Stevens Institute of Technology and is a Certified Information Systems Security Professional. He is a named inventor on patent numbers 5,577,209, Apparatus and Method for Providing Multi-level Security for Communications among Computers and Terminals on a Network, 5,872,847, Using Trusted Associations to Establish Trust in a Computer Network, 5,940,591 Apparatus and Method for Providing Network Security, and 6,212,636 Method for Establishing Trust in a Computer Network via Association. Mr. Maiwald is a regular presenter at a number of well-known security conferences. He has also written Security Planning and Disaster Recovery (with William Sieglein), and Fundamentals of Network Security, both published by Osborne/McGraw-Hill and is a contributing author for Hacking Linux Exposed, and Hackers Challenge also published by Osborne/McGraw-Hill.
show more

Rating details

24 ratings
4.5 out of 5 stars
5 71% (17)
4 12% (3)
3 12% (3)
2 4% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X