In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators who can protect networks is growing. If you are tasked with protecting your networks from these threats, or are studying security, Introduction to Network Security will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. The book teaches you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols. It explains how these systems currently operate and the limitations that lead to security weaknesses. All of the fundamental issues needed to understand network security, including the definition of security terms, security ethics, the OSI network model, and cryptography for networks are covered in detail.
The book focuses on the seven layers in the OSI network model by describing each overall layer, its security role, common vulnerabilities, and mitigation techniques. The discussion of each layer is followed by explicit examples of common protocols within the layer and their respective security issues. The last part of the book explores the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues. If you are new to network security, a general IT administrator, or a student, this is a must-have a resource to help ensure that you have the skills and knowledge required to protect your networks!
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators who can protect networks is growing. If you are tasked with protecting your networks from these threats, or are studying security, Introduction to Network Security will help you increase your understanding of potential threats, learn how to apply practical mitigation options, and react to attacks quickly. The book teaches you the skills and knowledge you need to design, develop, implement, analyze, and maintain networks and network protocols. It explains how these systems currently operate and the limitations that lead to security weaknesses. All of the fundamental issues needed to understand network security, including the definition of security terms, security ethics, the OSI network model, and cryptography for networks are covered in detail.
The book focuses on the seven layers in the OSI network model by describing each overall layer, its security role, common vulnerabilities, and mitigation techniques. The discussion of each layer is followed by explicit examples of common protocols within the layer and their respective security issues. The last part of the book explores the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues. If you are new to network security, a general IT administrator, or a student, this is a must-have a resource to help ensure that you have the skills and knowledge required to protect your networks!
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
Höhe: 234 mm
Breite: 185 mm
Dicke: 36 mm
Gewicht
ISBN-13
978-1-58450-464-1 (9781584504641)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Part I: Networking Fundamentals; Chapter 1: Security; Chapter 2: Network Theory; Chapter 3: Basic Cryptography; Part II: Physical Layer; Chapter 4: Layer 1 Overview; Chapter 5: LAN; Chapter 6:Wireless Networking; Part III: Datalink Layer; Chapter 7: Layer 2 Overview; Chapter 8: MAC and ARP; Chapter 9: SLIP and PPP; Part IV: Network Layer; Chapter 10: Layer 3 Overview; Chapter 11: Internet Protocol (IP); Chapter 12: Anonymity; Part V: Transport Layer; Chapter 13: Layer 4 Overview; Chapter 14: TCP; Chapter 15: UDP; Part VI: Session Layer; Chapter 16: Layer 5 Overview; Chapter 17: DNS; Part VII: Presentation Layer; Chapter 18: Layer 6 Overview; Chapter 19: SSL; Chapter 20: SSH; Part VIII: Application Layer; Chapter 21: Layer 7 Overview; Chapter 22: SMTP; Chapter 23: HTTP; Part IX: General Issues; Chapter 24: Modularity and Security; Chapter 25: Issues Summary; About the CD-ROM; Index