Network Defense And Countermeasures: Principles And Practices, 3/E at Meripustak

Network Defense And Countermeasures: Principles And Practices, 3/E

Books from same Author: William (Chuck) Easttom

Books from same Publisher: PEARSON INDIA

Related Category: Author List / Publisher List


  • Retail Price: ₹ 1020/- [ 5.00% off ]

    Seller Price: ₹ 969

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 5.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 5.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)William (Chuck) Easttom
    PublisherPEARSON INDIA
    Edition3rd Edition
    ISBN9789389552881
    Pages544
    BindingPaperback
    LanguageEnglish
    Publish YearApril 2020

    Description

    PEARSON INDIA Network Defense And Countermeasures: Principles And Practices, 3/E by William (Chuck) Easttom

    Network Defense and Countermeasures: Principles and Practices, Third Edition is designed to be the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to network defense. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, Ransomware, malware, security policies and security standards. Unlike many other authors, however, he also fully addresses more specialized issues, including cryptrography, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates. Table of Content "Chapter 1: Introduction to Network Security Chapter 2: Types of Attacks Chapter 3: Fundamentals of Firewalls Chapter 4: Firewall Practical Applications Chapter 5: Intrusion-Detection Systems Chapter 6: Encryption Fundamentals Chapter 7: Virtual Private Networks Chapter 8: Operating System Hardening Chapter 9: Defending Against Virus Attacks Chapter 10: Defending Against Trojan Horses, Spyware, and Adware Chapter 11: Security Policies Chapter 12: Assessing System Security Chapter 13: Security Standards Chapter 14: Physical Security and Disaster Recovery Chapter 15: Techniques Used by Attackers Chapter 16: Introduction to Forensics Chapter 17: Cyber Terrorism Appendix A Glossary " Salient Features 1. The most up-to-date network defense text on the market 2. Solid coverage of basic cryptography including its history, symmetric key systems, public/private key systems and digital signatures and certificates 3. Covers oft-neglected subject areas such as defense strategies, forms of attacks, and policies related to network security 4. Contains end-of-chapter exercises, projects, review questions, and plenty of real-world tips