Network Security: A Practical Approach
4.5/5
()
About this ebook
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.
- Helps you see through a hacker's eyes so you can make your network more secure.
- Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
- Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
- Covers techniques for enhancing the physical security of your systems and network.
- Explains how hackers use information-gathering to find and exploit security flaws.
- Examines the most effective ways to prevent hackers from gaining root access to a server.
- Addresses Denial of Service attacks, "malware," and spoofing.
- Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Jan L. Harrington
Jan L. Harrington, author of more than 35 books on a variety of technical subjects, has been writing about databases since 1984. She retired in 2013 from her position as professor and chair of the Department of Computing Technology at Marist College, where she taught database design and management, data communications, computer architecture, and the impact of technology on society for 25 years.
Read more from Jan L. Harrington
SQL Clearly Explained Rating: 5 out of 5 stars5/5Relational Database Design and Implementation: Clearly Explained Rating: 0 out of 5 stars0 ratingsRelational Database Design and Implementation Rating: 5 out of 5 stars5/5Database Design: Know It All Rating: 5 out of 5 stars5/5Ethernet Networking for the Small Office and Professional Home Office Rating: 4 out of 5 stars4/5Relational Database Design Clearly Explained Rating: 5 out of 5 stars5/5
Related to Network Security
Titles in the series (29)
Bluetooth Application Programming with the Java APIs Essentials Edition Rating: 5 out of 5 stars5/5IPv6: Theory, Protocol, and Practice Rating: 5 out of 5 stars5/5MPLS: Next Steps Rating: 4 out of 5 stars4/5Network Simulation Experiments Manual Rating: 4 out of 5 stars4/5Policy-Based Network Management: Solutions for the Next Generation Rating: 3 out of 5 stars3/5Developing IP-Based Services: Solutions for Service Providers and Vendors Rating: 0 out of 5 stars0 ratingsMulticast Communication: Protocols, Programming, & Applications Rating: 1 out of 5 stars1/5Network Security: A Practical Approach Rating: 5 out of 5 stars5/5GMPLS: Architecture and Applications Rating: 5 out of 5 stars5/5MPLS Network Management: MIBs, Tools, and Techniques Rating: 0 out of 5 stars0 ratingsTelecommunications Law in the Internet Age Rating: 4 out of 5 stars4/5The Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsInternet QoS: Architectures and Mechanisms for Quality of Service Rating: 4 out of 5 stars4/5TCP/IP Clearly Explained Rating: 4 out of 5 stars4/5Content Networking: Architecture, Protocols, and Practice Rating: 5 out of 5 stars5/5Modern Cable Television Technology Rating: 0 out of 5 stars0 ratingsRouting, Flow, and Capacity Design in Communication and Computer Networks Rating: 0 out of 5 stars0 ratingsBluetooth Application Programming with the Java APIs Rating: 0 out of 5 stars0 ratingsDeploying IP and MPLS QoS for Multiservice Networks: Theory and Practice Rating: 0 out of 5 stars0 ratingsInformation Assurance: Dependability and Security in Networked Systems Rating: 5 out of 5 stars5/5Computer Networks: A Systems Approach Rating: 4 out of 5 stars4/5Network Simulation Experiments Manual Rating: 5 out of 5 stars5/5Network Analysis, Architecture, and Design Rating: 3 out of 5 stars3/5Wireless Communications & Networking Rating: 3 out of 5 stars3/5Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice Rating: 5 out of 5 stars5/5Wireless Networking Rating: 2 out of 5 stars2/5Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective Rating: 0 out of 5 stars0 ratingsNetwork Routing: Algorithms, Protocols, and Architectures Rating: 0 out of 5 stars0 ratingsNetwork Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Rating: 4 out of 5 stars4/5
Related ebooks
Computer and Information Security Handbook Rating: 2 out of 5 stars2/5Firewalls: Jumpstart for Network and Systems Administrators Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsThe Internet and Its Protocols: A Comparative Approach Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Wireless Operational Security Rating: 0 out of 5 stars0 ratingsNetwork Security: Know It All Rating: 4 out of 5 stars4/5Securing the Cloud: Cloud Computer Security Techniques and Tactics Rating: 5 out of 5 stars5/5Computer Networks: A Systems Approach Rating: 4 out of 5 stars4/5Applied Network Security Rating: 0 out of 5 stars0 ratingsNetwork Routing: Algorithms, Protocols, and Architectures Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing Essentials Rating: 5 out of 5 stars5/5Firewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5Wireshark Essentials Rating: 0 out of 5 stars0 ratingsWireshark Network Security Rating: 3 out of 5 stars3/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Wireless Networking Complete Rating: 5 out of 5 stars5/5Wireless Security: Know It All Rating: 5 out of 5 stars5/5Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition Rating: 0 out of 5 stars0 ratingsThe Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Rating: 4 out of 5 stars4/5Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Rating: 5 out of 5 stars5/5Architecture of Network Systems Rating: 5 out of 5 stars5/5DNS Security: Defending the Domain Name System Rating: 4 out of 5 stars4/5Nmap Essentials Rating: 4 out of 5 stars4/5Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools Rating: 0 out of 5 stars0 ratingsWireless Networking: Know It All Rating: 5 out of 5 stars5/5Kali Linux – Assuring Security by Penetration Testing Rating: 3 out of 5 stars3/5Mastering Metasploit Rating: 0 out of 5 stars0 ratings
Networking For You
Networking For Dummies Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsMicrosoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsCCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsQuantum Computing For Dummies Rating: 0 out of 5 stars0 ratingsAWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam Rating: 0 out of 5 stars0 ratingsThe Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) Rating: 1 out of 5 stars1/5Networking All-in-One For Dummies Rating: 5 out of 5 stars5/5SharePoint For Dummies Rating: 0 out of 5 stars0 ratingsHacking Android Rating: 4 out of 5 stars4/5A Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5Windows Command Line Administration Instant Reference Rating: 0 out of 5 stars0 ratingsMicrosoft Certified Azure Fundamentals Study Guide: Exam AZ-900 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Cisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5The Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5TCP/IP for Everyone Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Artificial Intelligence for Fashion: How AI is Revolutionizing the Fashion Industry Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5IPv6: Theory, Protocol, and Practice Rating: 5 out of 5 stars5/5A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsHome Networking Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5
Reviews for Network Security
2 ratings0 reviews