• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Network Security Bible » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Network Security Bible

ISBN-13: 9780470502495 / Angielski / Miękka / 2009 / 936 str.

Eric Cole
Network Security Bible Eric Cole 9780470502495  - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Network Security Bible

ISBN-13: 9780470502495 / Angielski / Miękka / 2009 / 936 str.

Eric Cole
cena 228,65
(netto: 217,76 VAT:  5%)

Najniższa cena z 30 dni: 229,28
Termin realizacji zamówienia:
ok. 16-18 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.

  • Covers all core areas of network security and how they interrelate
  • Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide
  • Examines new trends and best practices in use by organizations to secure their enterprises
  • Features additional chapters on areas related to data protection/correlation and forensics
  • Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats
If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know.

Kategorie:
Informatyka, Internet
Kategorie BISAC:
Computers > Security - General
Język:
Angielski
ISBN-13:
9780470502495
Rok wydania:
2009
Numer serii:
000002433
Ilość stron:
936
Waga:
1.58 kg
Wymiary:
23.32 x 18.8 x 4.65
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia

Introduction.

Part I: Network Security Landscape.

Chapter 1: State of Network Security.

Chapter 2: New Approaches to Cyber Security.

Chapter3: InterfacingwiththeOrganization.

Part II: Security Principles and Practices.

Chapter 4: Information System Security Principles.

Chapter 5: Information System Security Management.

Chapter 6: Access Control.

Chapter 7: Attacks and Threats.

Part III: Operating Systems and Applications.

Chapter 8: Windows Security.

Chapter 9: UNIX and Linux Security.

Chapter 10: Web Browser and Client Security.

Chapter 11: Web Security.

Chapter 12: Electronic mail (E–mail) Security.

Chapter13:DomainName System.

Chapter 14: Server Security.

Part IV: Network Security Fundamentals.

Chapter15:NetworkProtocols.

Chapter 16: Wireless Security.

Chapter17:NetworkArchitecture Fundamentals.

Chapter18: Firewalls.

Chapter 19: Intrusion Detection/Prevention.

Part V: Communication.

Chapter 20: Secret Communication.

Chapter21:CovertCommunication.

Chapter 22: Applications of Secure/Covert Communication.

Part VI: The Security Threat and Response.

Chapter23: IntrusionDetection andResponse.

Chapter 25: Security Assessments, Testing, and Evaluation.

Part VII: Integrated Cyber Security.

Chapter 26: Validating Your Security.

Chapter27:DataProtection.

Chapter 28: Putting Everything Together.

Chapter29:The Future.

Index.

Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News.

Complements your Cisco Academy course instruction in networking security!

Network Security Bible

Second Edition

Eric Cole

Understand the changing security landscape

Learn the latest approaches and best practices

Secure your enterprise and data worldwide

The book you need to succeed!

If you′re in charge of network security, you need this book

Since the first edition of this comprehensive guide, cyber threats have increased, the stakes have gotten higher, and what is considered state of the art security has evolved. This packed new edition, thoroughly revised to cover the very latest techniques, is the detailed wall–to–wall resource you need to keep your network secure. Understand the changing threats, find out what defense in depth means and why you need it, learn best practices, and take control with this must–have book.

  • Understand current threats and attacks and how they succeed

  • Answer 30 critical questions and see how your network security is today

  • Consider mission resilience and make sure your critical functions survive

  • Master crypto, steganography, VPN, and other covert communications

  • Learn effective techniques for Windows®, Linux®, browser, e–mail, and wireless security

  • Explore the basics of digital forensics, including evidence preservation

  • Do risk analysis, make a global plan, and prepare for business continuity and recovery



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia