For introductory courses in Network Security; also appropriate as a supplementary text to a general information course in Networking.
This text solves the need for a resource that illustrates the principles underlying security technology, as well as provides complete hands-on exercises for the laboratory. Based on open-source software, this text is oriented toward the first-time networking student. Progressive, practical exercises build confidence; SOHO (small-office-home-office) users will also be impressed with the information provided in the text, as for these users the affordability of open-source solutions can be critical.
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Maße
Höhe: 100 mm
Breite: 100 mm
Dicke: 100 mm
Gewicht
ISBN-13
978-0-13-154731-5 (9780131547315)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Dr. Richard W. Tibbs
Dr. Tibbs earned a Ph.D. from George Mason University's College of System and Information Technology Engineering, specializing in operations research. He holds an M.S. in Computer Science and a B.S. in Applied Mathematics from the University of ado, Boulder. His research interests are network security, network and computer capacity planning, queuing theory & simulation, traffic monitoring & analysis, and adaptive routing in telecommunications networks. He is a member of ACM, IEEE, and INFORMS. He has worked in industry, government, and academia for over 20 years before joining Radford University as a full-time faculty member. His industry background includes aerospace, telecommunications, and software development. His government background includes the U.S. Geological Survey, the MITRE Corporation, a federally funded research and development center where he worked on Department of Transportation projects.
Mr. Edward B. Oakes
Mr. Oakes earned a B.S. in Computer Science from Radford University and is currently completing an M.S. in Education with concentration in Technology. In 2004 he was awarded the Anna Lee Stewart Award for Contributions to Faculty Development. He is currently the Director of Academic Computing at Radford University and has over 14 years of experience in networking and security. In addition to other roles, he has served as the Information Security Officer for Radford University for over 5 years. His interests include network security, wireless computing, and incorporating technology into the classroom.
Preface
PART ONE: NETWORKING CONCEPTS AND THE TCP/IP PROTOCOL SUITE
Chapter 1: Introduction to Network and Data Link Layer Protocols
Chapter 2: TCP and UDP in Detail
PART TWO: FIREWALL BASICS
Chapter 3: Software, Small Office, and Enterprise Firewalls
Chapter 4: Threats, Packet Filtering, and Stateful Firewalls
Chapter 5: Illustrated Exercises in Basic Firewall Installation
Chapter 6: Determining Requirements for the Firewall
PART THREE: VPNS AND LOGGING
Chapter 7: Introduction to Advanced Firewall Concepts and Terminology
Chapter 8: Virtual Private Networks
Chapter 9: Techniques for Integration of Firewall Logs and System Logs
Appendix A: Generating Operating System Images
Appendix B: Initial Lab Setup and Hardware Requirements for Lab Variations
Appendix C: TCP and UDP Port List
Appendix D: ICMP Types
Appendix E: IP Protocol Transport Numbers
Glossary
References