Network Security: A Practical Approach
4.5/5
()
About this ebook
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.
- Helps you see through a hacker's eyes so you can make your network more secure.
- Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
- Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
- Covers techniques for enhancing the physical security of your systems and network.
- Explains how hackers use information-gathering to find and exploit security flaws.
- Examines the most effective ways to prevent hackers from gaining root access to a server.
- Addresses Denial of Service attacks, "malware," and spoofing.
- Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Jan L. Harrington
Jan L. Harrington, author of more than 35 books on a variety of technical subjects, has been writing about databases since 1984. She retired in 2013 from her position as professor and chair of the Department of Computing Technology at Marist College, where she taught database design and management, data communications, computer architecture, and the impact of technology on society for 25 years.
Read more from Jan L. Harrington
SQL Clearly Explained Rating: 5 out of 5 stars5/5Relational Database Design and Implementation Rating: 5 out of 5 stars5/5Relational Database Design and Implementation: Clearly Explained Rating: 0 out of 5 stars0 ratingsDatabase Design: Know It All Rating: 5 out of 5 stars5/5Relational Database Design Clearly Explained Rating: 5 out of 5 stars5/5Ethernet Networking for the Small Office and Professional Home Office Rating: 4 out of 5 stars4/5
Related to Network Security
Titles in the series (29)
MPLS: Next Steps Rating: 4 out of 5 stars4/5Network Simulation Experiments Manual Rating: 4 out of 5 stars4/5Telecommunications Law in the Internet Age Rating: 4 out of 5 stars4/5MPLS Network Management: MIBs, Tools, and Techniques Rating: 0 out of 5 stars0 ratingsNetwork Security: A Practical Approach Rating: 5 out of 5 stars5/5Content Networking: Architecture, Protocols, and Practice Rating: 5 out of 5 stars5/5Multicast Communication: Protocols, Programming, & Applications Rating: 1 out of 5 stars1/5Bluetooth Application Programming with the Java APIs Essentials Edition Rating: 5 out of 5 stars5/5GMPLS: Architecture and Applications Rating: 5 out of 5 stars5/5Internet QoS: Architectures and Mechanisms for Quality of Service Rating: 4 out of 5 stars4/5Developing IP-Based Services: Solutions for Service Providers and Vendors Rating: 0 out of 5 stars0 ratingsTCP/IP Clearly Explained Rating: 4 out of 5 stars4/5IPv6: Theory, Protocol, and Practice Rating: 5 out of 5 stars5/5Modern Cable Television Technology Rating: 0 out of 5 stars0 ratingsThe Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsPolicy-Based Network Management: Solutions for the Next Generation Rating: 3 out of 5 stars3/5Bluetooth Application Programming with the Java APIs Rating: 0 out of 5 stars0 ratingsComputer Networks: A Systems Approach Rating: 4 out of 5 stars4/5Network Simulation Experiments Manual Rating: 5 out of 5 stars5/5Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice Rating: 0 out of 5 stars0 ratingsWireless Communications & Networking Rating: 3 out of 5 stars3/5Routing, Flow, and Capacity Design in Communication and Computer Networks Rating: 0 out of 5 stars0 ratingsWireless Networking Rating: 2 out of 5 stars2/5Information Assurance: Dependability and Security in Networked Systems Rating: 5 out of 5 stars5/5Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice Rating: 5 out of 5 stars5/5Network Routing: Algorithms, Protocols, and Architectures Rating: 0 out of 5 stars0 ratingsNetwork Analysis, Architecture, and Design Rating: 3 out of 5 stars3/5Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective Rating: 0 out of 5 stars0 ratingsNetwork Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Rating: 4 out of 5 stars4/5
Related ebooks
Computer and Information Security Handbook Rating: 2 out of 5 stars2/5Firewalls: Jumpstart for Network and Systems Administrators Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsThe Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Wireless Operational Security Rating: 0 out of 5 stars0 ratingsNetwork Security: Know It All Rating: 4 out of 5 stars4/5Securing the Cloud: Cloud Computer Security Techniques and Tactics Rating: 5 out of 5 stars5/5Computer Networks: A Systems Approach Rating: 4 out of 5 stars4/5Applied Network Security Rating: 0 out of 5 stars0 ratingsNetwork Routing: Algorithms, Protocols, and Architectures Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing Essentials Rating: 5 out of 5 stars5/5Firewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5Wireshark Essentials Rating: 0 out of 5 stars0 ratingsWireshark Network Security Rating: 3 out of 5 stars3/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Wireless Networking Complete Rating: 5 out of 5 stars5/5Wireless Security: Know It All Rating: 5 out of 5 stars5/5Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition Rating: 0 out of 5 stars0 ratingsThe Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Rating: 4 out of 5 stars4/5Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Rating: 5 out of 5 stars5/5Architecture of Network Systems Rating: 5 out of 5 stars5/5DNS Security: Defending the Domain Name System Rating: 4 out of 5 stars4/5Nmap Essentials Rating: 4 out of 5 stars4/5Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools Rating: 0 out of 5 stars0 ratingsWireless Networking: Know It All Rating: 5 out of 5 stars5/5Kali Linux – Assuring Security by Penetration Testing Rating: 3 out of 5 stars3/5Mastering Metasploit Rating: 0 out of 5 stars0 ratings
Networking For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) Rating: 1 out of 5 stars1/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsAWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5The Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsA Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsHome Networking Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5Cisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5Networking For Dummies Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsNetworking All-in-One For Dummies Rating: 5 out of 5 stars5/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5MCA Microsoft Certified Associate Azure Administrator Study Guide: Exam AZ-104 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5SharePoint For Dummies Rating: 0 out of 5 stars0 ratingsThe Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Raspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5Microsoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsConfiguring and Troubleshooting Windows XP Professional Rating: 0 out of 5 stars0 ratingsApplied Network Security Monitoring: Collection, Detection, and Analysis Rating: 3 out of 5 stars3/5Cisco Packet Tracer for Beginners Rating: 5 out of 5 stars5/5Emergency Preparedness and Off-Grid Communication Rating: 0 out of 5 stars0 ratingsActive Directory with PowerShell Rating: 4 out of 5 stars4/5
Reviews for Network Security
2 ratings0 reviews