Cargando…

Network defense and countermeasures : principles and practices /

Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to todays most useful and practical introduction to defending moder...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Easttom, Chuck (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Pearson IT, [2024]
Edición:Fourth edition.
Colección:Cybersecurity curriculum.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000nam a22000007i 4500
001 OR_on1398335570
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 230920s2024 njua ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCO 
020 |z 9780138200589 
035 |a (OCoLC)1398335570 
037 |a 9780138200626  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20230920 
049 |a UAMI 
100 1 |a Easttom, Chuck,  |e author. 
245 1 0 |a Network defense and countermeasures :  |b principles and practices /  |c Dr. Chuck Easttom. 
250 |a Fourth edition. 
264 1 |a Hoboken, New Jersey :  |b Pearson IT,  |c [2024] 
300 |a 1 online resource (624 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cybersecurity curriculum 
504 |a Includes bibliographical references and index. 
520 |a Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to todays most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions youll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. Youll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. Youll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what youve learnedin the classroom and in your career. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
830 0 |a Cybersecurity curriculum. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780138200626/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP