Network Security: A Practical Approach
4.5/5
()
About this ebook
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.
- Helps you see through a hacker's eyes so you can make your network more secure.
- Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
- Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
- Covers techniques for enhancing the physical security of your systems and network.
- Explains how hackers use information-gathering to find and exploit security flaws.
- Examines the most effective ways to prevent hackers from gaining root access to a server.
- Addresses Denial of Service attacks, "malware," and spoofing.
- Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Jan L. Harrington
Jan L. Harrington, author of more than 35 books on a variety of technical subjects, has been writing about databases since 1984. She retired in 2013 from her position as professor and chair of the Department of Computing Technology at Marist College, where she taught database design and management, data communications, computer architecture, and the impact of technology on society for 25 years.
Read more from Jan L. Harrington
SQL Clearly Explained Rating: 5 out of 5 stars5/5Relational Database Design and Implementation Rating: 5 out of 5 stars5/5Database Design: Know It All Rating: 5 out of 5 stars5/5Relational Database Design Clearly Explained Rating: 5 out of 5 stars5/5Relational Database Design and Implementation: Clearly Explained Rating: 0 out of 5 stars0 ratingsEthernet Networking for the Small Office and Professional Home Office Rating: 4 out of 5 stars4/5
Related to Network Security
Titles in the series (29)
Bluetooth Application Programming with the Java APIs Essentials Edition Rating: 5 out of 5 stars5/5Network Simulation Experiments Manual Rating: 4 out of 5 stars4/5MPLS: Next Steps Rating: 4 out of 5 stars4/5Telecommunications Law in the Internet Age Rating: 4 out of 5 stars4/5Internet QoS: Architectures and Mechanisms for Quality of Service Rating: 4 out of 5 stars4/5GMPLS: Architecture and Applications Rating: 5 out of 5 stars5/5Network Security: A Practical Approach Rating: 5 out of 5 stars5/5Modern Cable Television Technology Rating: 0 out of 5 stars0 ratingsMulticast Communication: Protocols, Programming, & Applications Rating: 1 out of 5 stars1/5Content Networking: Architecture, Protocols, and Practice Rating: 5 out of 5 stars5/5IPv6: Theory, Protocol, and Practice Rating: 5 out of 5 stars5/5MPLS Network Management: MIBs, Tools, and Techniques Rating: 0 out of 5 stars0 ratingsTCP/IP Clearly Explained Rating: 4 out of 5 stars4/5Developing IP-Based Services: Solutions for Service Providers and Vendors Rating: 0 out of 5 stars0 ratingsNetwork Simulation Experiments Manual Rating: 5 out of 5 stars5/5The Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsBluetooth Application Programming with the Java APIs Rating: 0 out of 5 stars0 ratingsComputer Networks: A Systems Approach Rating: 4 out of 5 stars4/5Routing, Flow, and Capacity Design in Communication and Computer Networks Rating: 0 out of 5 stars0 ratingsPolicy-Based Network Management: Solutions for the Next Generation Rating: 3 out of 5 stars3/5Wireless Networking Rating: 2 out of 5 stars2/5Information Assurance: Dependability and Security in Networked Systems Rating: 5 out of 5 stars5/5Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Rating: 4 out of 5 stars4/5Network Analysis, Architecture, and Design Rating: 3 out of 5 stars3/5Wireless Communications & Networking Rating: 3 out of 5 stars3/5Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective Rating: 0 out of 5 stars0 ratingsDeploying IP and MPLS QoS for Multiservice Networks: Theory and Practice Rating: 0 out of 5 stars0 ratingsInternet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice Rating: 5 out of 5 stars5/5Network Routing: Algorithms, Protocols, and Architectures Rating: 0 out of 5 stars0 ratings
Related ebooks
Computer and Information Security Handbook Rating: 2 out of 5 stars2/5Firewalls: Jumpstart for Network and Systems Administrators Rating: 0 out of 5 stars0 ratingsData Networks: Routing, Security, and Performance Optimization Rating: 5 out of 5 stars5/5Kali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Managing Information Security Rating: 5 out of 5 stars5/5Wireless Operational Security Rating: 0 out of 5 stars0 ratingsThe Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsUnderstanding and Designing Computer Networks Rating: 5 out of 5 stars5/5Network Security: Know It All Rating: 4 out of 5 stars4/5Applied Network Security Rating: 0 out of 5 stars0 ratingsThe Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Rating: 4 out of 5 stars4/5Securing the Cloud: Cloud Computer Security Techniques and Tactics Rating: 5 out of 5 stars5/5Network Routing: Algorithms, Protocols, and Architectures Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5Mastering Wireshark Rating: 2 out of 5 stars2/5Architecture of Network Systems Rating: 5 out of 5 stars5/5Wireshark Network Security Rating: 3 out of 5 stars3/5Nmap Essentials Rating: 4 out of 5 stars4/5Computer Networks: A Systems Approach Rating: 4 out of 5 stars4/5IPv6: Theory, Protocol, and Practice Rating: 5 out of 5 stars5/5CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition Rating: 4 out of 5 stars4/5Kali Linux Wireless Penetration Testing Essentials Rating: 5 out of 5 stars5/5Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools Rating: 0 out of 5 stars0 ratingsDNS Security: Defending the Domain Name System Rating: 4 out of 5 stars4/5A Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Rating: 5 out of 5 stars5/5Network and System Security Rating: 4 out of 5 stars4/5Mastering Metasploit Rating: 0 out of 5 stars0 ratingsWireshark Essentials Rating: 0 out of 5 stars0 ratings
Networking For You
Networking For Dummies Rating: 5 out of 5 stars5/5Networking All-in-One For Dummies Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5Cisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsConcise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Home Networking Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsUnlock Any Roku Device: Watch Shows, TV, & Download Apps Rating: 0 out of 5 stars0 ratingsThe Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam Rating: 0 out of 5 stars0 ratingsIPv6: Theory, Protocol, and Practice Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Computer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsGetting Started with PowerShell Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) Rating: 1 out of 5 stars1/5Comptia Network+ Primer Rating: 0 out of 5 stars0 ratingsHacking Android Rating: 4 out of 5 stars4/5
Reviews for Network Security
2 ratings0 reviews