Network Defense and Countermeasures: Principles and Practices (Certification/Training)
<P style="MARGIN: 0px" align=center text-align="center"> <B>Everything you need to know about modern network attacks and defense, in one book</B> </P> <P style="MARGIN: 0px" align=center text-align="center">Clearly explains core network security concepts, challenges, technologies, and skills</P> <P style="MARGIN: 0px" align=center text-align="center">Thoroughly updated for the latest attacks and countermeasures</P> <P style="MARGIN: 0px" align=center text-align="center">The perfect beginner’s guide for anyone interested in a network security career</P> <P style="MARGIN: 0px">¿</P> <P style="MARGIN: 0px">Security is the IT industry’s hottest topic–<I>and that’s where the hottest opportunities are, too</I>. Organizations desperately need professionals who can help them safeguard against the most sophisticated attacks ever created–attacks from well-funded global criminal syndicates, and even governments.</P> <P style="MARGIN: 0px">¿</P> <P style="MARGIN: 0px">Today, security begins with defending the organizational network. <I>Network Defense and Countermeasures</I>, Second Edition is today’s most complete, easy-to-understand introduction to modern network attacks and their effective defense.</P> <P style="MARGIN: 0px">From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. Starting with the absolute basics, he discusses crucial topics many security books overlook, including the emergence of network-based espionage and terrorism.</P> <P style="MARGIN: 0px">¿</P> <P style="MARGIN: 0px">If you have a basic understanding of networks, that’s all the background you’ll need to succeed with this book: no math or advanced computer science is required. You’ll find projects, questions, exercises, case studies, links to expert resources, and a complete glossary–all designed to deepen your understanding and prepare you to defend real-world networks.</P> <P style="MARGIN: 0px">¿</P> <P style="MARGIN: 0px"> <B>Learn how to</B> </P> <P style="MARGIN: 0px">Understand essential network security concepts, challenges, and careers</P> <P style="MARGIN: 0px">Learn how modern attacks work</P> <P style="MARGIN: 0px">Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks</P> <P style="MARGIN: 0px">Select the right security technologies for any network environment</P> <P style="MARGIN: 0px">Use encryption to protect information</P> <P style="MARGIN: 0px">Harden Windows and Linux systems and keep them patched</P> <P style="MARGIN: 0px">Securely configure web browsers to resist attacks</P> <P style="MARGIN: 0px">Defend against malware</P> <P style="MARGIN: 0px">Define practical, enforceable security policies</P> <P style="MARGIN: 0px">Use the “6 Ps†to assess technical and human aspects of system security</P> <P style="MARGIN: 0px">Detect and fix system vulnerability</P> <P style="MARGIN: 0px">Apply proven security standards and models, including Orange Book, Common Criteria, and Bell-LaPadula</P> <P style="MARGIN: 0px">Ensure physical security and prepare for disaster recovery</P> <P style="MARGIN: 0px">Know your enemy: learn basic hacking, and see how to counter it</P> <P style="MARGIN: 0px">Understand standard forensic techniques and prepare for investigations of digital crime</P> <P style="MARGIN: 0px">¿</P>